Arbitrary Code Execution

Affecting yamldotnet package, versions [,5.0.0)

Overview

yamldotnetprovides low level parsing and emitting of YAML as well as a high level object model similar to XmlDocument.

Affected versions of this package are vulnerable to Arbitrary Code Execution.

The Deserializer.Deserialize() function deserializes user-controlled types and blindly instantiates them. An attacker may send a specually crafted yaml file, which will then execute code in the context of the running process.

Remediation

Upgrade yamldotnet to version 5.0.0 or higher.

References

Do your applications use this vulnerable package?

CVSS Score

7.8
high severity
  • Attack Vector
    Local
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    Required
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    High
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Credit
Kurt Boberg
CVE
CVE-2018-1000210
CWE
CWE-94
Snyk ID
SNYK-DOTNET-YAMLDOTNET-60255
Disclosed
19 Jul, 2018
Published
19 Jul, 2018