SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.
Published 2022-12-01 11:15:11
Updated 2025-02-13 17:15:36
Source Google Inc.
View at NVD,   CVE.org
Vulnerability category: Execute code

Products affected by CVE-2022-1471

Exploit prediction scoring system (EPSS) score for CVE-2022-1471

93.71%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2022-1471

  • PyTorch Model Server Registration and Deserialization RCE
    Disclosure Date: 2023-10-03
    First seen: 2023-10-15
    exploit/multi/http/torchserver_cve_2023_43654
    The PyTorch model server contains multiple vulnerabilities that can be chained together to permit an unauthenticated remote attacker arbitrary Java code execution. The first vulnerability is that the management interface is bound to all IP addresses and not just the loop b

CVSS scores for CVE-2022-1471

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
8.3
HIGH CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
2.8
5.5
Google Inc.
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
NIST
9.8
CRITICAL AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
N/A
N/A
Oracle:CPUOct2023

CWE ids for CVE-2022-1471

  • The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
    Assigned by: cve-coordination@google.com (Secondary)
  • The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
    Assigned by: nvd@nist.gov (Primary)

References for CVE-2022-1471

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!