Apache Shardingsphere < 4.0.1 - Insecure Deserialization
Title source: ruleDescription
In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE.
Exploits (4)
nomisec
WORKING POC
1 stars
by shadowsock5 · poc
https://github.com/shadowsock5/ShardingSphere_CVE-2020-1947
References (1)
Core 1
Core References
Vendor Advisory x_refsource_confirm
https://lists.apache.org/thread.html/r4a61a24c119bd820da6fb02100d286f8aae55c8f9b94a346b9bb27d8%40%3Cdev.shardingsphere.apache.org%3E
Scores
CVSS v3
9.8
EPSS
0.8546
EPSS Percentile
99.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lab Environment
COMMUNITY
Community Lab
+1 more repos
Details
CWE
CWE-502
Status
published
Products (2)
apache/shardingsphere
4.0.0 (2 CPE variants)
org.apache.shardingsphere/shardingsphere
4.0.0-RC3 - 4.0.1Maven
Published
Mar 11, 2020
Tracked Since
Feb 18, 2026