-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from improper input validation during YAML/JSON parsing. The Decode method in the json serializer and Unmarshal function in util/json were identified as entry points for processing untrusted input. Both failed to implement size/depth limits, making them susceptible to 'Billion Laughs'-style attacks. The fix in commit 8ef4566 introduced size constraints, confirming these functions were the attack vectors. The CWE-776 mapping (recursive entity expansion) directly implicates the deserialization logic in these components.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| k8s.io/apimachinery | go | < 0.0.0-20190927203648-9ce6eca90e73 | 0.0.0-20190927203648-9ce6eca90e73 |
KEV Misses 88% of Exploited CVEs- Get the report