Skip to content

Potential denial of service in modules making use of user-specificed YAML

High
gdude2002 published GHSA-4725-965f-99mw Mar 18, 2023

Package

maven org.quiltmc.community:module-log-parser (Maven)

Affected versions

< 1.0.1-SNAPSHOT

Patched versions

1.0.1-SNAPSHOT
maven org.quiltmc.community:module-moderation (Maven)
< 1.0.1-SNAPSHOT
1.0.1-SNAPSHOT
maven org.quiltmc.community:module-role-sync (Maven)
< 1.0.1-SNAPSHOT
1.0.1-SNAPSHOT
maven org.quiltmc.community:module-tags (Maven)
< 1.0.1-SNAPSHOT
1.0.1-SNAPSHOT
maven org.quiltmc.community:module-user-cleanup (Maven)
< 1.0.1-SNAPSHOT
1.0.1-SNAPSHOT
maven org.quiltmc.community:module-welcome (Maven)
< 1.0.1-SNAPSHOT
1.0.1-SNAPSHOT

Description

Impact

In Cozy modules that allow users to provide YAML-formatted data containing anchors and aliases, the YAML parser used may cause the excessive consumption of memory and result in crashes.

Patches

Cozy modules at version 1.0.1-SNAPSHOT and later make use of an updated parser that no longer has this vulnerability.

Note: While not all modules utilize a YAML parser, it's important that any modules you're using are updated together and have the same version - not doing so may cause some parts of your project to continue to depend on the vulnerable parser.

Workarounds

None.

References


Thanks to @charleskorn for responding to our report and fixing the vulnerability so quickly.

Severity

High

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE ID

No known CVE

Weaknesses

Credits