PyTorch Model Server Registration and Deserialization RCE
Title source: metasploitDescription
SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.
Exploits (6)
nomisec
WORKING POC
8 stars
by 1fabunicorn · poc
https://github.com/1fabunicorn/SnakeYAML-CVE-2022-1471-POC
github
WORKING POC
5 stars
by JAckLosingHeart · javapoc
https://github.com/JAckLosingHeart/CVE-PoC-Collection/tree/main/snakeyaml-CVE-2022-1471
metasploit
WORKING POC
EXCELLENT
by Idan Levcovich, Guy Kaplan, Gal Elbaz, Swapneil Kumar Dash, Spencer McIntyre · rubypocjava
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/torchserver_cve_2023_43654.rb
References (11)
Scores
CVSS v3
8.3
EPSS
0.9385
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
Lab Environment
Details
CWE
CWE-502
CWE-20
Status
published
Products (2)
org.yaml/snakeyaml
0 - 2.0Maven
snakeyaml_project/snakeyaml
< 2.0
Published
Dec 01, 2022
Tracked Since
Feb 18, 2026