Description
An issue was discovered in Esoteric YamlBeans through 1.15. A crafted YAML document is able perform am XML Entity Expansion attack against YamlBeans YamlReader. By exploiting the Anchor feature in YAML, it is possible to generate a small YAML document that, when read, is expanded to a large size, causing CPU and memory consumption, such as a Java Out-of-Memory exception.
Remediation
References
https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md
https://github.com/EsotericSoftware
https://contrastsecurity.com
Related Vulnerabilities
CVE-2020-17519 Vulnerability in maven package org.apache.flink:flink-runtime_2.12
CVE-2022-29172 Vulnerability in maven package org.webjars.bower:auth0-lock
CVE-2023-40826 Vulnerability in maven package org.pf4j:pf4j
CVE-2021-22144 Vulnerability in maven package org.elasticsearch:elasticsearch
CVE-2022-33891 Vulnerability in maven package org.apache.spark:spark-core_2.12