[ https://issues.apache.org/jira/browse/CASSANDRA-18149?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17675731#comment-17675731 ]
Brandon Williams commented on CASSANDRA-18149: ---------------------------------------------- CVE-2021-4235: https://nvd.nist.gov/vuln/detail/CVE-2021-4235 Denial of service vector, which isn't a concern. CVE-2022-1471: https://nvd.nist.gov/vuln/detail/CVE-2022-1471 RCE through the Constructor() class. It is recommended to use the SafeConstructor() class instead. I've created CASSANDRA-18150 to handle that. CVE-2022-3064: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3064 parsing malicious yaml can cause a DoS, again not a concern. > snakeyaml vulnerabilities: CVE-2021-4235, CVE-2022-1471, CVE-2022-3064 > ---------------------------------------------------------------------- > > Key: CASSANDRA-18149 > URL: https://issues.apache.org/jira/browse/CASSANDRA-18149 > Project: Cassandra > Issue Type: Bug > Components: Dependencies > Reporter: Brandon Williams > Assignee: Brandon Williams > Priority: Normal > Fix For: 3.0.x, 3.11.x, 4.0.x, 4.1.x, 4.x > > > The OWASP scan is reporting these for both snakeyaml-1.11 and snakeyaml-1.26. > These are similar to CASSANDRA-17907 in that they require access to the yaml > to have any effect. -- This message was sent by Atlassian Jira (v8.20.10#820010) --------------------------------------------------------------------- To unsubscribe, e-mail: commits-unsubscr...@cassandra.apache.org For additional commands, e-mail: commits-h...@cassandra.apache.org