We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-24620



Assignermitre
Reserved2023-01-30
Published2023-08-25
Updated2024-10-02

Description

An issue was discovered in Esoteric YamlBeans through 1.15. A crafted YAML document is able perform am XML Entity Expansion attack against YamlBeans YamlReader. By exploiting the Anchor feature in YAML, it is possible to generate a small YAML document that, when read, is expanded to a large size, causing CPU and memory consumption, such as a Java Out-of-Memory exception.

References

https://github.com/EsotericSoftware

https://contrastsecurity.com

https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md

cve.org CVE-2023-24620

nvd.nist.gov CVE-2023-24620

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.