YAML File Parsing Vulnerability in Apache Commons Configuration
CVE-2020-1953
10CRITICAL
Summary
Apache Commons Configuration is susceptible to vulnerabilities due to its use of a third-party library for YAML file parsing. By default, this library allows the instantiation of classes if the YAML includes specific statements. As a result, if a YAML file from an untrusted source is loaded, it may lead to the execution of code that the host application cannot control. This poses significant security risks, particularly in applications that process YAML files from potentially malicious origins.
Affected Version(s)
Apache Commons Configuration 2.2
Apache Commons Configuration 2.3
Apache Commons Configuration 2.4
References
CVSS V3.1
Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved