Arbitrary Code Execution

Affecting yamldotnet package, versions [,5.0.0)

high severity

Overview

yamldotnetprovides low level parsing and emitting of YAML as well as a high level object model similar to XmlDocument.

Affected versions of this package are vulnerable to Arbitrary Code Execution.

The Deserializer.Deserialize() function deserializes user-controlled types and blindly instantiates them. An attacker may send a specually crafted yaml file, which will then execute code in the context of the running process.

Remediation

Upgrade yamldotnet to version 5.0.0 or higher.

References

Do your applications use this vulnerable package?

Credit
Kurt Boberg
CVE
CVE-2018-1000210
CWE
CWE-94
Snyk ID
SNYK-DOTNET-YAMLDOTNET-60255
Disclosed
19 Jul, 2018
Published
19 Jul, 2018