|
|||
Rule General Information |
---|
Release Date: | 2020-09-01 | |
Rule Name: | Apache ShardingSphere SnakeYAML Insecure Deserialization Vulnerability (CVE-2020-1947) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE. | |
Impact: | An attacker could exploit this vulnerability to have unspecified effect. | |
Affected OS: | Windows, Others | |
Reference: | https://lists.apache.org/thread.html/r4a61a24c119bd820da6fb02100d286f8aae55c8f9b94a346b9bb27d8%40%3Cdev.shardingsphere.apache.org%3E |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://lists.apache.org/thread.html/r4a61a24c119bd820da6fb02100d286f8aae55c8f9b94a346b9bb27d8%40%3Cdev.shardingsphere.apache.org%3E |