Property
Languagejava
Severitymedium
CWECWE-502: Deserialization of Untrusted Data
OWASPA08:2017 - Insecure Deserialization
Confidence LevelLow
Impact LevelHigh
Likelihood LevelLow

Description#

Using the default SnakeYAML Yaml() constructor without specifying a safe or custom constructor allows loading YAML files with potentially dangerous object types. This can make your application vulnerable to deserialization attacks when processing untrusted YAML input.

Impact#

If exploited, an attacker could craft malicious YAML files that, when loaded, execute arbitrary code or perform unauthorized actions on your server. This could lead to data breaches, system compromise, or further attacks within your organization.