Vulnerability Description
In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Shardingsphere | 4.0.0 |
Related Weaknesses (CWE)
References
- https://lists.apache.org/thread.html/r4a61a24c119bd820da6fb02100d286f8aae55c8f9bVendor Advisory
- https://lists.apache.org/thread.html/r4a61a24c119bd820da6fb02100d286f8aae55c8f9bVendor Advisory
FAQ
What is CVE-2020-1947?
CVE-2020-1947 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmar...
How severe is CVE-2020-1947?
CVE-2020-1947 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-1947?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Shardingsphere.