Description
It was noticed that Apache Heron 0.20.2-incubating, Release 0.20.1-incubating, and Release v-0.20.0-incubating does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerabilities (CWE-502: Deserialization of Untrusted Data).
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-0617 | It was noticed that Apache Heron 0.20.2-incubating, Release 0.20.1-incubating, and Release v-0.20.0-incubating does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerabilities (CWE-502: Deserialization of Untrusted Data). |
Github GHSA |
GHSA-hjgm-f7vx-m5g7 | Deserialization of Untrusted Data in Apache Heron |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T06:54:00.371Z
Reserved: 2019-12-02T00:00:00.000Z
Link: CVE-2020-1964
No data.
Status : Modified
Published: 2020-04-16T19:15:28.290
Modified: 2024-11-21T05:11:44.880
Link: CVE-2020-1964
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA