CVE-2022-1471

HIGH LAB

PyTorch Model Server Registration and Deserialization RCE

Title source: metasploit

Description

SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.

Exploits (6)

nomisec WORKING POC 8 stars
by 1fabunicorn · poc
https://github.com/1fabunicorn/SnakeYAML-CVE-2022-1471-POC
github WORKING POC 5 stars
by JAckLosingHeart · javapoc
https://github.com/JAckLosingHeart/CVE-PoC-Collection/tree/main/snakeyaml-CVE-2022-1471
nomisec WORKING POC 4 stars
by falconkei · poc
https://github.com/falconkei/snakeyaml_cve_poc
nomisec NO CODE
by jelee2555 · poc
https://github.com/jelee2555/CVE-2022-1471-attacker
nomisec WORKING POC
by seal-sec-demo-2 · poc
https://github.com/seal-sec-demo-2/yaml-payload
metasploit WORKING POC EXCELLENT
by Idan Levcovich, Guy Kaplan, Gal Elbaz, Swapneil Kumar Dash, Spencer McIntyre · rubypocjava
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/torchserver_cve_2023_43654.rb

Scores

CVSS v3 8.3
EPSS 0.9385
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L

Details

CWE
CWE-502 CWE-20
Status published
Products (2)
org.yaml/snakeyaml 0 - 2.0Maven
snakeyaml_project/snakeyaml < 2.0
Published Dec 01, 2022
Tracked Since Feb 18, 2026