
Cloud Vulnerability DB
A community-led vulnerabilities database
Apache Commons Configuration versions 2.2 through 2.6 contained a vulnerability related to YAML file parsing. The vulnerability was discovered by Daniel Kalinowski of ISEC.pl Research Team and was assigned CVE-2020-1953. The issue affected the library's handling of YAML files through a third-party parser that allowed class instantiation by default (OpenWall, CVE Mitre).
The vulnerability stems from Apache Commons Configuration's use of a third-party library for parsing YAML files, which by default allows the instantiation of classes when the YAML includes special statements. The default settings of this library were not modified in versions 2.2 through 2.6, creating a potential security risk. The severity was rated as Moderate (OpenWall).
If a YAML file is loaded from an untrusted source, it could lead to arbitrary code execution outside the control of the host application. This could potentially allow attackers to execute malicious code through specially crafted YAML files (CVE Mitre, OpenWall).
Users should upgrade to Apache Commons Configuration version 2.7 or later, which prevents class instantiation by the YAML processor. This version addresses the vulnerability by changing the default settings of the YAML parsing library (OpenWall).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."