
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
SnakeYaml's Constructor() class contains a critical vulnerability (CVE-2022-1471) that does not restrict types which can be instantiated during deserialization. When deserializing YAML content provided by an attacker, this vulnerability can lead to remote code execution. The issue affects SnakeYAML versions prior to 2.0 (NVD, Google Advisory).
The vulnerability exists in the Constructor() class which inherits from SafeConstructor and allows any type to be deserialized when using the pattern 'new Yaml(new Constructor(TestDataClass.class)).load(yamlContent)'. Types do not have to match the properties in the target class, and while a ConstructorException is thrown, this only occurs after malicious payload deserialization has already taken place. The vulnerability has received a CVSS v3.1 base score of 9.8 CRITICAL (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) (NVD).
Successful exploitation of this vulnerability could allow attackers to execute arbitrary code remotely on affected systems. The vulnerability enables attackers to instantiate any class available in the application's classpath, potentially leading to remote code execution through deserialization gadget chains (Bitbucket Issue).
The recommended mitigation is to use SnakeYAML's SafeConstructor when parsing untrusted content to restrict deserialization. Users should upgrade to SnakeYAML version 2.0 or later which addresses this vulnerability. For applications that cannot upgrade immediately, implementing strict type checking and using SafeConstructor as a drop-in replacement for Constructor is advised (NVD, Google Advisory).
The vulnerability has received significant attention from the security community and major organizations. Multiple vendors including NetApp, Atlassian, and Kubernetes have issued security advisories and patches for their affected products. The widespread use of SnakeYAML in Java applications has led to increased concern about the potential impact of this vulnerability (NetApp Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”