Description
JBoss RESTEasy before version 3.1.2 could be forced into parsing a request with YamlProvider, resulting in unmarshalling of potentially untrusted data which could allow an attacker to execute arbitrary code with RESTEasy application permissions.
Remediation
References
http://rhn.redhat.com/errata/RHSA-2017-1255.html
http://rhn.redhat.com/errata/RHSA-2017-1409.html
http://www.securityfocus.com/bid/94940
http://www.securitytracker.com/id/1038524
https://access.redhat.com/errata/RHSA-2017:1253
https://access.redhat.com/errata/RHSA-2017:1254
https://access.redhat.com/errata/RHSA-2017:1256
https://access.redhat.com/errata/RHSA-2017:1260
https://access.redhat.com/errata/RHSA-2017:1410
https://access.redhat.com/errata/RHSA-2017:1411
https://access.redhat.com/errata/RHSA-2017:1412
https://access.redhat.com/errata/RHSA-2017:1675
https://access.redhat.com/errata/RHSA-2017:1676
https://access.redhat.com/errata/RHSA-2018:2909
https://access.redhat.com/errata/RHSA-2018:2913
https://bugzilla.redhat.com/show_bug.cgi?id=1400644
Related Vulnerabilities
CVE-2023-24163 Vulnerability in maven package cn.hutool:hutool-all
CVE-2020-5497 Vulnerability in maven package org.mitre:openid-connect-common
CVE-2019-5448 Vulnerability in npm package yarn
CVE-2015-5209 Vulnerability in maven package org.apache.struts.xwork:xwork-core
CVE-2016-2510 Vulnerability in maven package org.beanshell:bsh