YAML File Parsing Vulnerability in Apache Commons Configuration
CVE-2020-1953

10CRITICAL

Key Information:

Vendor
Apache
Vendor
CVE Published:
13 March 2020

Summary

Apache Commons Configuration is susceptible to vulnerabilities due to its use of a third-party library for YAML file parsing. By default, this library allows the instantiation of classes if the YAML includes specific statements. As a result, if a YAML file from an untrusted source is loaded, it may lead to the execution of code that the host application cannot control. This poses significant security risks, particularly in applications that process YAML files from potentially malicious origins.

Affected Version(s)

Apache Commons Configuration 2.2

Apache Commons Configuration 2.3

Apache Commons Configuration 2.4

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.