CVE-2022-1471:
SnakeYaml Constructor Deserialization Remote Code Execution
8.3
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
12/12/2022
Updated
2/6/2025
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.yaml:snakeyaml | maven | <= 1.33 | 2.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerable functions are identified based on the stack trace provided in the description of the vulnerability. The functions are part of the deserialization process in SnakeYaml and are related to the Constructor class, which is known to be vulnerable to remote code execution due to the lack of type checks during deserialization.
Vulnerable functions
org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.constructJavaBean2ndStep
Constructor.java
This method is part of the deserialization process and is vulnerable to remote code execution due to the lack of type checks during deserialization.
org.yaml.snakeyaml.constructor.BaseConstructor.constructObjectNoCheck
BaseConstructor.java
This method is involved in the deserialization process and could be related to the vulnerability.
org.yaml.snakeyaml.constructor.BaseConstructor.constructObject
BaseConstructor.java
This method is part of the deserialization process and is potentially related to the vulnerability.
org.yaml.snakeyaml.constructor.BaseConstructor.constructDocument
BaseConstructor.java
This method is involved in the deserialization process and could be related to the vulnerability.
org.yaml.snakeyaml.Yaml.loadFromReader
Yaml.java
This method is part of the deserialization process and is potentially related to the vulnerability.
org.yaml.snakeyaml.Yaml.load
Yaml.java
This method is the entry point for the deserialization process and is potentially related to the vulnerability.