[ 
https://issues.apache.org/jira/browse/CASSANDRA-18149?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17899968#comment-17899968
 ] 

Stefan Miklosovic commented on CASSANDRA-18149:
-----------------------------------------------

[~Kaps_11]

Brandon wrote: 

_CVE-2022-1471: https://nvd.nist.gov/vuln/detail/CVE-2022-1471 RCE through the 
Constructor() class. It is recommended to use the SafeConstructor() class 
instead. I've created CASSANDRA-18150 to handle that._

I think this is fixed and the respective CVE is not exploitable in Cassandra 
anymore. Do you understand it differently?

> snakeyaml vulnerabilities: CVE-2021-4235, CVE-2022-1471, CVE-2022-3064
> ----------------------------------------------------------------------
>
>                 Key: CASSANDRA-18149
>                 URL: https://issues.apache.org/jira/browse/CASSANDRA-18149
>             Project: Cassandra
>          Issue Type: Bug
>          Components: Dependencies
>            Reporter: Brandon Williams
>            Assignee: Brandon Williams
>            Priority: Normal
>             Fix For: 3.0.29, 3.11.15, 4.0.8, 4.1.1, 5.0-alpha1, 5.0
>
>
> The OWASP scan is reporting these for both snakeyaml-1.11 and snakeyaml-1.26.
> These are similar to CASSANDRA-17907 in that they require access to the yaml 
> to have any effect.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to