Improper Input Validation Affecting commons-configuration2 package, versions <2.7-1


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
1.56% (87th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-COMMONSCONFIGURATION2-560340
  • published15 Mar 2020
  • disclosed13 Mar 2020

Introduced: 13 Mar 2020

CVE-2020-1953  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade Debian:unstable commons-configuration2 to version 2.7-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream commons-configuration2 package and not the commons-configuration2 package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. So if a YAML file was loaded from an untrusted source, it could therefore load and execute code out of the control of the host application.

CVSS Scores

version 3.1