We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-24620



Description

An issue was discovered in Esoteric YamlBeans through 1.15. A crafted YAML document is able perform am XML Entity Expansion attack against YamlBeans YamlReader. By exploiting the Anchor feature in YAML, it is possible to generate a small YAML document that, when read, is expanded to a large size, causing CPU and memory consumption, such as a Java Out-of-Memory exception.

Reserved 2023-01-30 | Published 2023-08-25 | Updated 2024-10-02 | Assigner mitre

References

github.com/EsotericSoftware

contrastsecurity.com

github.com/...t-Security-OSS/yamlbeans/blob/main/SECURITY.md

cve.org (CVE-2023-24620)

nvd.nist.gov (CVE-2023-24620)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-24620

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.