CVE-2021-4235

Published: Dic 27, 2022 Last Modified: Apr 11, 2025 EU-VD ID: EUVD-2022-7731 Aliases: GHSA-r88r-gmrh-7j83
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 5,5
Attack Vector: local
Attack Complexity: low
Privileges Required: none
User Interaction: required
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high

Description

AI Translation Available

Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0005
Percentile
0,2th
Updated

EPSS Score Trend (Last 91 Days)

Application

Yaml by Yaml Project

Version Range Affected
To 2.2.3 (exclusive)
cpe:2.3:a:yaml_project:yaml:*:*:*:*:*:go:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/go-yaml/yaml/commit/bb4e33bf68bf89cad44d386192cbed201f35b241
https://github.com/go-yaml/yaml/pull/375
Exploit Patch Third Party Advisory
https://github.com/go-yaml/yaml/pull/375
https://lists.debian.org/debian-lts-announce/2023/07/msg00001.html
https://pkg.go.dev/vuln/GO-2021-0061
https://github.com/go-yaml/yaml/commit/bb4e33bf68bf89cad44d386192cbed201f35b241
https://github.com/go-yaml/yaml/pull/375
Exploit Patch Third Party Advisory
https://github.com/go-yaml/yaml/pull/375
https://lists.debian.org/debian-lts-announce/2023/07/msg00001.html
https://pkg.go.dev/vuln/GO-2021-0061