CVE-2023-38647
CVSS 3.1 Score 9.8 of 10 (high)
Details
Summary
CVE-2023-38647 is a new vulnerability that allows an attacker to execute arbitrary code through unbounded deserialization in SnakeYAML. Specifically, they can manipulate the deserialization of java.net.URLClassLoader and javax.script.ScriptEngineManager in Helix REST start and Workflow creation. This can lead to remote code execution, impacting all versions below 1.3.0 of helix-core and helix-rest. To mitigate this risk, it's recommended to stop using YAML-based configuration and workflow creation in the short term. In the long term, organizations should upgrade to Helix version 1.3.0.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Affected Vendors
- Apache Software Foundation
Advisories, Assessments, and Mitigations
Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future
- Gain complete coverage of your cyber, third party, and physical attack surface
- Proactively mitigate threats before they turn into costly attacks
- Make fast, effective, data-driven decisions