Files
CVEs-PoC/2021/CVE-2021-4235.md
T
2024-05-25 21:48:12 +02:00

19 lines
820 B
Markdown

### [CVE-2021-4235](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4235)
![](https://img.shields.io/static/v1?label=Product&message=github.com%2Fgo-yaml%2Fyaml&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=gopkg.in%2Fyaml.v2&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.2.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE%20400%3A%20Uncontrolled%20Resource%20Consumption&color=brighgreen)
### Description
Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon