Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2020-8441
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-19 Feb, 2020 | 17:15
Updated At-13 Mar, 2020 | 10:15

JYaml through 1.3 allows remote code execution during deserialization of a malicious payload through the load() function. NOTE: this is a discontinued product.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

jyaml_project
jyaml_project
>>jyaml>>Versions up to 1.3(inclusive)
cpe:2.3:a:jyaml_project:jyaml:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-502Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://gist.github.com/j0lt-github/f5141abcacae63d434ecae211422153acve@mitre.org
Exploit
Third Party Advisory
https://github.com/mbechler/marshalseccve@mitre.org
Third Party Advisory
https://github.com/mbechler/marshalsec/blob/master/marshalsec.pdfcve@mitre.org
Technical Description
Third Party Advisory
https://security.netapp.com/advisory/ntap-20200313-0001/cve@mitre.org
N/A
https://sourceforge.net/p/jyaml/bugs/cve@mitre.org
Third Party Advisory
Change History
0Changes found

Details not found