[ 
https://issues.apache.org/jira/browse/CASSANDRA-18149?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17675731#comment-17675731
 ] 

Brandon Williams commented on CASSANDRA-18149:
----------------------------------------------

CVE-2021-4235: https://nvd.nist.gov/vuln/detail/CVE-2021-4235  Denial of 
service vector, which isn't a concern.

CVE-2022-1471: https://nvd.nist.gov/vuln/detail/CVE-2022-1471 RCE through the 
Constructor() class.  It is recommended to use the SafeConstructor() class 
instead.  I've created CASSANDRA-18150 to handle that.

CVE-2022-3064: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3064 
parsing malicious yaml can cause a DoS, again not a concern.


> snakeyaml vulnerabilities: CVE-2021-4235, CVE-2022-1471, CVE-2022-3064
> ----------------------------------------------------------------------
>
>                 Key: CASSANDRA-18149
>                 URL: https://issues.apache.org/jira/browse/CASSANDRA-18149
>             Project: Cassandra
>          Issue Type: Bug
>          Components: Dependencies
>            Reporter: Brandon Williams
>            Assignee: Brandon Williams
>            Priority: Normal
>             Fix For: 3.0.x, 3.11.x, 4.0.x, 4.1.x, 4.x
>
>
> The OWASP scan is reporting these for both snakeyaml-1.11 and snakeyaml-1.26.
> These are similar to CASSANDRA-17907 in that they require access to the yaml 
> to have any effect.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscr...@cassandra.apache.org
For additional commands, e-mail: commits-h...@cassandra.apache.org

Reply via email to