CVE-2021-40146:
Remote Code Execution in Any23
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.86676%
CWE
-
Published
9/13/2021
Updated
2/1/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.any23:apache-any23 | maven | < 2.5 | 2.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability explicitly references YAMLExtractor.java as the source. RCE in YAML processors typically stems from unsafe deserialization patterns. The critical clue is the involvement of YAML parsing combined with the RCE outcome, which strongly suggests the extract() method (or equivalent YAML loading logic) uses an unsafe deserialization approach. The patch in version 2.5 likely replaced Yaml.load() with Yaml.safeLoad() or added type restrictions during deserialization.