-
Notifications
You must be signed in to change notification settings - Fork 278
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2022-38752 (Medium) detected in snakeyaml-1.29.jar #2555
Comments
No fix available for version 1.31 yet |
Looks like this is not gradle based dependency. It is coming from gradle caches for whitesource scanner
I do not see any other snakeyaml dependencies directly under this repo https://github.com/opensearch-project/opensearch-build/search?q=snakeyaml @bbarani Can we close this issue then? |
We are already on 1.33 thus close this. |
ℹ️ This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory. |
CVE-2022-38752 - Medium Severity Vulnerability
Vulnerable Library - snakeyaml-1.29.jar
YAML 1.1 parser and emitter for Java
Library home page: http://www.snakeyaml.org
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.29/6d0cdafb2010f1297e574656551d7145240f6e25/snakeyaml-1.29.jar
Dependency Hierarchy:
Found in HEAD commit: b439dcbcaec85cb505ff1870eaac296568ab9261
Found in base branch: main
Vulnerability Details
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.
Publish Date: 2022-09-05
URL: CVE-2022-38752
CVSS 3 Score Details (6.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-9w3m-gqgf-c4p9
Release Date: 2022-09-05
Fix Resolution: 1.32
The text was updated successfully, but these errors were encountered: