https://github.com/mbadanoiu/cve-2021-46364
CVE-2021-46364: YAML Deserialization in Magnolia CMS
https://github.com/mbadanoiu/cve-2021-46364
0-day authenticated cve cve-2021-46364 cves deserialization remote-code-execution
Last synced: about 2 months ago
JSON representation
CVE-2021-46364: YAML Deserialization in Magnolia CMS
- Host: GitHub
- URL: https://github.com/mbadanoiu/cve-2021-46364
- Owner: mbadanoiu
- Created: 2023-11-23T22:37:01.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2023-11-23T22:42:47.000Z (over 1 year ago)
- Last Synced: 2025-01-12T09:29:33.346Z (4 months ago)
- Topics: 0-day, authenticated, cve, cve-2021-46364, cves, deserialization, remote-code-execution
- Homepage:
- Size: 363 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CVE-2021-46364: YAML Deserialization in Magnolia CMS
Magnolia (versions <=6.2.3) has a Snake YAML parser which is vulnerable to deserialization attacks that can allow an attacker to call arbitrary Java constructors when importing YAML files.
Remote Code Execution has been achieved using this vulnerability.### Vendor Disclosure:
The vendor's disclosure and fix for this vulnerability can be found [here](https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory).
### Requirements:
This vulnerability requires:
- Valid user credentials### Proof Of Concept:
More details and the exploitation process can be found in this [PDF](https://github.com/mbadanoiu/CVE-2021-46364/blob/main/Magnolia%20CMS%20-%20CVE-2021-46364.pdf).