Description
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
Remediation
References
https://bitbucket.org/snakeyaml/snakeyaml/issues/530/stackoverflow-oss-fuzz-47039
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47039
https://lists.debian.org/debian-lts-announce/2022/10/msg00001.html
https://security.gentoo.org/glsa/202305-28
https://security.netapp.com/advisory/ntap-20240315-0010/
Related Vulnerabilities
CVE-2023-45133 Vulnerability in maven package org.webjars.npm:babel__traverse
CVE-2019-20174 Vulnerability in maven package org.webjars.bower:auth0-lock
CVE-2020-2122 Vulnerability in maven package org.jenkins-ci.plugins:brakeman
CVE-2019-10746 Vulnerability in npm package mixin-deep
CVE-2023-1584 Vulnerability in maven package io.quarkus:quarkus-oidc