[jira] [Comment Edited] (CONFIGURATION-829) Critical security vulnerability in snakeyaml

2023-03-24 Thread Aaron Coady (Jira)


[ 
https://issues.apache.org/jira/browse/CONFIGURATION-829?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17704668#comment-17704668
 ] 

Aaron Coady edited comment on CONFIGURATION-829 at 3/24/23 5:30 PM:


It appears this has already been addressed by 
[https://github.com/apache/commons-configuration/pull/282]

The version in the pom was bumped in this PR

https://github.com/apache/commons-configuration/pull/283

What release can this be included in?


was (Author: acoady):
It appears this has already been addressed by 
[https://github.com/apache/commons-configuration/pull/282]

Should we bump the version of snakeyaml in the pom to address this?

What release can this be included in?

> Critical security vulnerability in snakeyaml
> 
>
> Key: CONFIGURATION-829
> URL: https://issues.apache.org/jira/browse/CONFIGURATION-829
> Project: Commons Configuration
>  Issue Type: Bug
>  Components: File reloading
>Affects Versions: 2.8.0
>Reporter: Aaron Coady
>Priority: Major
>
> This vulnerability is fixed in snakeyaml 2.0 and requires a backwards 
> incompatible change in the constructor
> [https://nvd.nist.gov/vuln/detail/CVE-2022-1471]
>  
> SnakeYaml's Constructor() class does not restrict types which can be 
> instantiated during deserialization. Deserializing yaml content provided by 
> an attacker can lead to remote code execution. We recommend using SnakeYaml's 
> SafeConsturctor when parsing untrusted content to restrict deserialization.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Comment Edited] (CONFIGURATION-829) Critical security vulnerability in snakeyaml

2023-03-24 Thread Aaron Coady (Jira)


[ 
https://issues.apache.org/jira/browse/CONFIGURATION-829?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17704668#comment-17704668
 ] 

Aaron Coady edited comment on CONFIGURATION-829 at 3/24/23 3:41 PM:


It appears this has already been addressed by 
[https://github.com/apache/commons-configuration/pull/282]

Should we bump the version of snakeyaml in the pom to address this?

What release can this be included in?


was (Author: acoady):
It appears this has already been addressed by 
https://github.com/apache/commons-configuration/pull/282

> Critical security vulnerability in snakeyaml
> 
>
> Key: CONFIGURATION-829
> URL: https://issues.apache.org/jira/browse/CONFIGURATION-829
> Project: Commons Configuration
>  Issue Type: Bug
>  Components: File reloading
>Affects Versions: 2.8.0
>Reporter: Aaron Coady
>Priority: Major
>
> This vulnerability is fixed in snakeyaml 2.0 and requires a backwards 
> incompatible change in the constructor
> [https://nvd.nist.gov/vuln/detail/CVE-2022-1471]
>  
> SnakeYaml's Constructor() class does not restrict types which can be 
> instantiated during deserialization. Deserializing yaml content provided by 
> an attacker can lead to remote code execution. We recommend using SnakeYaml's 
> SafeConsturctor when parsing untrusted content to restrict deserialization.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (CONFIGURATION-829) Critical security vulnerability in snakeyaml

2023-03-24 Thread Aaron Coady (Jira)


[ 
https://issues.apache.org/jira/browse/CONFIGURATION-829?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17704668#comment-17704668
 ] 

Aaron Coady commented on CONFIGURATION-829:
---

It appears this has already been addressed by 
https://github.com/apache/commons-configuration/pull/282

> Critical security vulnerability in snakeyaml
> 
>
> Key: CONFIGURATION-829
> URL: https://issues.apache.org/jira/browse/CONFIGURATION-829
> Project: Commons Configuration
>  Issue Type: Bug
>  Components: File reloading
>Affects Versions: 2.8.0
>Reporter: Aaron Coady
>Priority: Major
>
> This vulnerability is fixed in snakeyaml 2.0 and requires a backwards 
> incompatible change in the constructor
> [https://nvd.nist.gov/vuln/detail/CVE-2022-1471]
>  
> SnakeYaml's Constructor() class does not restrict types which can be 
> instantiated during deserialization. Deserializing yaml content provided by 
> an attacker can lead to remote code execution. We recommend using SnakeYaml's 
> SafeConsturctor when parsing untrusted content to restrict deserialization.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (CONFIGURATION-829) Critical security vulnerability in snakeyaml

2023-03-24 Thread Aaron Coady (Jira)
Aaron Coady created CONFIGURATION-829:
-

 Summary: Critical security vulnerability in snakeyaml
 Key: CONFIGURATION-829
 URL: https://issues.apache.org/jira/browse/CONFIGURATION-829
 Project: Commons Configuration
  Issue Type: Bug
  Components: File reloading
Affects Versions: 2.8.0
Reporter: Aaron Coady


This vulnerability is fixed in snakeyaml 2.0 and requires a backwards 
incompatible change in the constructor
[https://nvd.nist.gov/vuln/detail/CVE-2022-1471]

 

SnakeYaml's Constructor() class does not restrict types which can be 
instantiated during deserialization. Deserializing yaml content provided by an 
attacker can lead to remote code execution. We recommend using SnakeYaml's 
SafeConsturctor when parsing untrusted content to restrict deserialization.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)