Description
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.
Remediation
References
https://bitbucket.org/snakeyaml/snakeyaml/issues/531/stackoverflow-oss-fuzz-47081
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47081
https://security.gentoo.org/glsa/202305-28
https://security.netapp.com/advisory/ntap-20240315-0009/
Related Vulnerabilities
CVE-2021-25914 Vulnerability in npm package object-collider
CVE-2021-23632 Vulnerability in npm package git
CVE-2019-1003048 Vulnerability in maven package com.programmingresearch:prqa-plugin
CVE-2018-5673 Vulnerability in maven package org.webjars.bowergithub.dojo:dojo
CVE-2018-1306 Vulnerability in maven package org.apache.portals.pluto:portletv3annotateddemo