NIST nvd entry CVE-2022-38752

Issue #548 invalid
Benjamin Lautenschlager created an issue

According to this NVD entry there’s a stack-overflow based vulnerability in SnakeYAML. I haven’t checked the credibility or possible solutions to the problem yet; but since we use SnakeYAML as a dependency this raises vulnerability warnings in our CI/CD pipeline.

Comments (7)

  1. Andrey Somov
    1. unfortunately it was proven to have too many false positives (like in this case)
    2. if you do not blindly open a socket and consume any trash from any untrusted user without authentication - you are safe
    3. similar case already reported many times in SnakeYAML (I welcome you to search before you create a new issue)
    4. there is a wiki with explanation

    My disappointment with the low quality tooling is growing…

  2. Benjamin Lautenschlager reporter

    Okay, thanks for your explanation. I could probably have found your explanation in the Wiki, where I haven’t searched. I searched your issues of course, but I don’t really understand why older CVEs make this one invalid.

    The tool itself is not really to blame here, is it? It merely searches the CVD-db and matches described versions - if anything, then the report at NIST itself is the one that’s wrong.

    Unfortunately we do not use SnakeYAML as a direct but rather as a transitive dependency so I have no control over the way data is fed into the relevant InputStreams. We will assess the risk for our software solutions and act accordingly.

  3. Andrey Somov

    The tool is very bad. It consumed your time, it consumed my time. We both wasted a lot of time.

    You must have complete control how you feed the data. Do you mean that you allow some component to open a socket and consume any input from anywhere ? In this case SnakeYAML is the least of concern.

    I think you depend on a tool which is using SnakeYAML to parse internal configuration. In this case you are safe. That is why it is false positive.

  4. Log in to comment