CVE-2022-1471: SnakeYaml Constructor Deserialization Remote Code Execution
8.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99857%
CWE
Published
12/12/2022
Updated
2/6/2025
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.yaml:snakeyaml | maven | <= 1.33 | 2.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerable functions are identified based on the stack trace provided in the description of the vulnerability. The functions are part of the deserialization process in SnakeYaml and are related to the Constructor class, which is known to be vulnerable to remote code execution due to the lack of type checks during deserialization.
Vulnerable functions
org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.constructJavaBean2ndStepConstructor.java
This method is part of the deserialization process and is vulnerable to remote code execution due to the lack of type checks during deserialization.
org.yaml.snakeyaml.constructor.BaseConstructor.constructObjectNoCheckBaseConstructor.java
This method is involved in the deserialization process and could be related to the vulnerability.
org.yaml.snakeyaml.constructor.BaseConstructor.constructObjectBaseConstructor.java
This method is part of the deserialization process and is potentially related to the vulnerability.
org.yaml.snakeyaml.constructor.BaseConstructor.constructDocumentBaseConstructor.java
This method is involved in the deserialization process and could be related to the vulnerability.
org.yaml.snakeyaml.Yaml.loadFromReaderYaml.java
This method is part of the deserialization process and is potentially related to the vulnerability.
org.yaml.snakeyaml.Yaml.loadYaml.java
This method is the entry point for the deserialization process and is potentially related to the vulnerability.