Remote Code Execution Vulnerability in Apache Brooklyn Using SnakeYAML
CVE-2016-8744

8.8HIGH

Key Information:

Vendor
Apache
Vendor
CVE Published:
13 September 2017

Summary

Apache Brooklyn leverages the SnakeYAML library for YAML input parsing. In versions prior to 0.10.0, the library permits unmarshalling to any Java class on the classpath due to its default configuration. This flaw allows authenticated users to execute arbitrary Java code within the environment running Brooklyn, resulting in potential unauthorized access to resources, file systems, and network operations. Moreover, there exists a proof-of-concept exploit that demonstrates the possibility of unauthorized code execution taking advantage of this vulnerability.

Affected Version(s)

Apache Brooklyn 0.9.0 and all prior versions

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.