[
https://issues.apache.org/jira/browse/CASSANDRA-18149?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17899968#comment-17899968
]
Stefan Miklosovic commented on CASSANDRA-18149:
-----------------------------------------------
[~Kaps_11]
Brandon wrote:
_CVE-2022-1471: https://nvd.nist.gov/vuln/detail/CVE-2022-1471 RCE through the
Constructor() class. It is recommended to use the SafeConstructor() class
instead. I've created CASSANDRA-18150 to handle that._
I think this is fixed and the respective CVE is not exploitable in Cassandra
anymore. Do you understand it differently?
> snakeyaml vulnerabilities: CVE-2021-4235, CVE-2022-1471, CVE-2022-3064
> ----------------------------------------------------------------------
>
> Key: CASSANDRA-18149
> URL: https://issues.apache.org/jira/browse/CASSANDRA-18149
> Project: Cassandra
> Issue Type: Bug
> Components: Dependencies
> Reporter: Brandon Williams
> Assignee: Brandon Williams
> Priority: Normal
> Fix For: 3.0.29, 3.11.15, 4.0.8, 4.1.1, 5.0-alpha1, 5.0
>
>
> The OWASP scan is reporting these for both snakeyaml-1.11 and snakeyaml-1.26.
> These are similar to CASSANDRA-17907 in that they require access to the yaml
> to have any effect.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]