Miggo Logo

CVE-2020-8441: Deserialization of Untrusted Data in JYaml

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.91373%
Published
5/24/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jyaml:jyamlmaven<= 1.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly states exploitation occurs through the load() function. Multiple sources (CVE, GitHub Advisory, and exploit documentation) confirm JYaml's load() method is the attack vector. The marshalsec framework specifically targets this function for payload generation, and the CWE-502 classification directly aligns with deserialization vulnerabilities in load methods. No other functions are mentioned in available documentation as contributing to this vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

JY*ml t*rou** *.* *llows r*mot* *o** *x**ution *urin* **s*ri*liz*tion o* * m*li*ious p*ylo** t*rou** t** lo**() *un*tion. NOT*: t*is is * *is*ontinu** pro*u*t.

Reasoning

T** vuln*r**ility **s*ription *xpli*itly st*t*s *xploit*tion o**urs t*rou** t** `lo**()` *un*tion. Multipl* sour**s (*V*, *it*u* **visory, *n* *xploit *o*um*nt*tion) *on*irm JY*ml's `lo**()` m*t*o* is t** *tt**k v**tor. T** m*rs**ls** *r*m*work sp**i