{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2022-1471","assignerOrgId":"14ed7db2-1595-443d-9d34-6215bf890778","state":"PUBLISHED","assignerShortName":"Google","requesterUserId":"ed9b5bb2-2df1-4aa3-9791-5fb260d88e62","dateReserved":"2022-04-26T08:32:53.188Z","datePublished":"2022-12-01T10:47:07.203Z","dateUpdated":"2025-06-18T08:32:58.546Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"SnakeYAML","vendor":"SnakeYAML","versions":[{"lessThanOrEqual":"2.0","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization.&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.</span></span><br>"}],"value":"SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond."}],"impacts":[{"capecId":"CAPEC-253","descriptions":[{"lang":"en","value":"CAPEC-253 Remote Code Inclusion"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":8.3,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"14ed7db2-1595-443d-9d34-6215bf890778","shortName":"Google","dateUpdated":"2025-06-18T08:32:58.546Z"},"references":[{"url":"https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2"},{"url":"https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64581479"},{"url":"https://github.com/mbechler/marshalsec"},{"url":"https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true"},{"url":"https://groups.google.com/g/kubernetes-security-announce/c/mwrakFaEdnc"},{"url":"https://security.netapp.com/advisory/ntap-20230818-0015/"},{"url":"http://packetstormsecurity.com/files/175095/PyTorch-Model-Server-Registration-Deserialization-Remote-Code-Execution.html"},{"url":"http://www.openwall.com/lists/oss-security/2023/11/19/1"},{"url":"https://security.netapp.com/advisory/ntap-20240621-0006/"},{"url":"https://infosecwriteups.com/%EF%B8%8F-inside-the-160-comment-fight-to-fix-snakeyamls-rce-default-1a20c5ca4d4c"},{"url":"https://confluence.atlassian.com/security/cve-2022-1471-snakeyaml-library-rce-vulnerability-in-multiple-products-1296171009.html"}],"source":{"discovery":"UNKNOWN"},"title":"Remote Code execution in SnakeYAML","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:03:06.269Z"},"title":"CVE Program Container","references":[{"url":"https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2","tags":["x_transferred"]},{"url":"https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64581479","tags":["x_transferred"]},{"url":"https://github.com/mbechler/marshalsec","tags":["x_transferred"]},{"url":"https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true","tags":["x_transferred"]},{"url":"https://groups.google.com/g/kubernetes-security-announce/c/mwrakFaEdnc","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20230818-0015/","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/175095/PyTorch-Model-Server-Registration-Deserialization-Remote-Code-Execution.html","tags":["x_transferred"]},{"url":"http://www.openwall.com/lists/oss-security/2023/11/19/1","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20240621-0006/","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-07T18:13:22.155371Z","id":"CVE-2022-1471","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-17T13:52:47.976Z"}}]},"dataVersion":"5.1"}