Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2022-1471 in snakeyaml exposable through jackson-dataformat-yaml 2.14.2? #382

Closed
Emuto opened this issue Feb 14, 2023 · 3 comments
Closed

Comments

@Emuto
Copy link

Emuto commented Feb 14, 2023

Hi everyone,

Upgrading to version 2.14.2 of jackson-dataformat-yaml seems to include the introduction of snakeyaml library as a dependency. This vulnerability is listed as critical in NVD: https://nvd.nist.gov/vuln/detail/CVE-2022-1471. As far as I understand, snakeyaml won't fix this in any new versions, so my question would be - is jackson using snakeyaml in a safe way (not using Constructor() class at all but instead SafeConstructor())?

Thanks and Best Regards!

@yawkat
Copy link
Member

yawkat commented Feb 14, 2023

jackson does not use the snakeyaml constructors at all, it uses the parser directly

@yawkat yawkat closed this as completed Feb 14, 2023
@cowtowncoder
Copy link
Member

@Emuto SnakeYAML has always been a dependency, so this is not new.

But as @yawkat pointed out module DOES NOT use higher-level databinding from SnakeYAML (hence no Constructor of any kind) but just the token sequence interface. As such many CVEs reported lately against SnakeYAML are N/A to jackson-dataformat-yaml.

@Emuto
Copy link
Author

Emuto commented Feb 17, 2023

Thanks a lot! :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants