Description
In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE.
Remediation
References
https://lists.apache.org/thread.html/r4a61a24c119bd820da6fb02100d286f8aae55c8f9b94a346b9bb27d8%40%3Cdev.shardingsphere.apache.org%3E
Related Vulnerabilities
CVE-2022-37022 Vulnerability in maven package org.apache.geode:geode-core
CVE-2023-33938 Vulnerability in maven package com.liferay.portal:release.portal.bom
CVE-2022-22984 Vulnerability in npm package snyk-sbt-plugin
CVE-2023-35155 Vulnerability in maven package org.xwiki.platform:xwiki-platform-sharepage-api
CVE-2013-6397 Vulnerability in maven package org.apache.solr:solr-velocity