Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-1000210

EPSS 0.34% · P57
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-1000210

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
YamlDotNet version 4.3.2 and earlier contains a Insecure Direct Object Reference vulnerability in The default behavior of Deserializer.Deserialize() will deserialize user-controlled types in the line "currentType = Type.GetType(nodeEvent.Tag.Substring(1), throwOnError: false);" and blindly instantiates them. that can result in Code execution in the context of the running process. This attack appear to be exploitable via Victim must parse a specially-crafted YAML file. This vulnerability appears to have been fixed in 5.0.0.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
YamlDotNet 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
YamlDotNet是一个YAML(标记语言)的.NET库,它主要提供YAML的低级解析和发送,并包括一个序列化库。 YamlDotNet 4.3.2及之前版本中的‘Deserializer()’函数的默认行为存在安全漏洞,该漏洞源于程序没有安全的实例化‘currentType = Type.GetType(nodeEvent.Tag.Substring(1), throwOnError: false);’行中由用户控制的类型。攻击者可借助特制的YAML文件利用该漏洞执行代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2018-1000210

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-1000210

登录查看更多情报信息。

Same Patch Batch · n/a · 2018-07-13 · 30 CVEs total

CVE-2018-14047PNGwriter 安全漏洞
CVE-2013-0570多款IBM产品Networking Operating System 安全漏洞
CVE-2018-1000211Doorkeepe 访问控制错误漏洞
CVE-2018-1000209Sensu Core for Windows 安全漏洞
CVE-2018-1000208MODX Revolution 路径遍历漏洞
CVE-2018-1000207MODX Revolution 访问控制错误漏洞
CVE-2018-1000206JFrog Artifactory 跨站请求伪造漏洞
CVE-2018-7535TotalAV 安全漏洞
CVE-2018-10098MicroWorld eScan Internet Security Suite for Business econceal.sys驱动程序安全漏洞
CVE-2018-10018G DATA Total Security 缓冲区错误漏洞
CVE-2018-14052libwav 安全漏洞
CVE-2018-14051libwav 安全漏洞
CVE-2018-14050libwav 安全漏洞
CVE-2018-14049libwav 安全漏洞
CVE-2018-14048libpng 安全漏洞
CVE-2018-14054MP4v2 安全漏洞
CVE-2018-14046Exiv2 缓冲区错误漏洞
CVE-2018-14045Olli Parviainen SoundTouch 安全漏洞
CVE-2018-14044Olli Parviainen SoundTouch 安全漏洞
CVE-2018-14043mstdlib 安全漏洞

Showing top 20 of 30 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2018-1000210

No comments yet


Leave a comment