Skip to content

YAML Go package vulnerable to denial of service

Moderate severity GitHub Reviewed Published Dec 28, 2022 to the GitHub Advisory Database • Updated Feb 9, 2023

Package

gomod github.com/go-yaml/yaml (Go)

Affected versions

<= 2.1.0

Patched versions

None
gomod gopkg.in/yaml.v2 (Go)
< 2.2.3
2.2.3

Description

Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.

References

Published by the National Vulnerability Database Dec 27, 2022
Published to the GitHub Advisory Database Dec 28, 2022
Reviewed Dec 30, 2022
Last updated Feb 9, 2023

Severity

Moderate
5.5
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Weaknesses

No CWEs

CVE ID

CVE-2021-4235

GHSA ID

GHSA-r88r-gmrh-7j83

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.