Uploaded image for project: 'WildFly'
  1. WildFly
  2. WFLY-17747

SnakeYAML is vulnerable to remote code execution

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Won't Do
    • Icon: Major Major
    • None
    • 26.1.2.Final
    • REST
    • None
    • ---
    • ---

      SnakeYAML is vulnerable to remote code execution (RCE) when used in an application to parse untrusted user-supplied YAML files. A remote attacker could craft a malicious YAML file that when deserialized allows arbitrary command execution on the target system.

      The above fixes is available with the snakeyaml-1.32.jar

      As of now wildfly bundle the snakeyaml-1.29.jar, can be seen in following location

      wildfly-26.1.2.Final\modules\system\layers\base\org\yaml\snakeyaml\main

      wildfly-26.1.3.Final\modules\system\layers\base\org\yaml\snakeyaml\main

      We need to bundle the latest snakeyaml jar, which is snakeyaml-1.32.jarĀ 

              bstansbe@redhat.com Brian Stansberry
              rshan45 Raushan singh (Inactive)
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                Resolved: