Description
An issue was discovered in Esoteric YamlBeans through 1.15. A crafted YAML document is able perform am XML Entity Expansion attack against YamlBeans YamlReader. By exploiting the Anchor feature in YAML, it is possible to generate a small YAML document that, when read, is expanded to a large size, causing CPU and memory consumption, such as a Java Out-of-Memory exception.
Remediation
References
https://contrastsecurity.com
https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md
https://github.com/EsotericSoftware
Related Vulnerabilities
CVE-2021-32730 Vulnerability in maven package org.xwiki.platform:xwiki-platform-administration-ui
CVE-2021-23899 Vulnerability in maven package com.mikesamuel:json-sanitizer
CVE-2020-2256 Vulnerability in maven package org.jenkins-ci.plugins:pipeline-maven-parent
CVE-2019-10358 Vulnerability in maven package org.jenkins-ci.main:maven-plugin
CVE-2022-23944 Vulnerability in maven package org.apache.shenyu:shenyu-common