Miggo Logo

CVE-2022-28948: gopkg.in/yaml.v3 Denial of Service

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.81417%
Published
5/20/2022
Updated
5/20/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
gopkg.in/yaml.v3go< 3.0.0-20220521103104-8f96da9f5d5e3.0.0-20220521103104-8f96da9f5d5e

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The analysis involves understanding the vulnerability, examining the patch, and identifying the functions directly related to the issue. The Unmarshal function is the entry point for deserialization, parse and peek functions are involved in the parsing process, and the patch modifies the peek function to handle errors properly.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* in t** Unm*rs**l *un*tion in *o-Y*ml v* **n **us* * pro*r*m to p*ni* w**n *tt*mptin* to **s*ri*liz* inv*li* input.

Reasoning

T** *n*lysis involv*s un**rst*n*in* t** vuln*r**ility, *x*minin* t** p*t**, *n* i**nti*yin* t** *un*tions *ir**tly r*l*t** to t** issu*. T** `Unm*rs**l` *un*tion is t** *ntry point *or **s*ri*liz*tion, `p*rs*` *n* `p**k` *un*tions *r* involv** in t**