| عنوان | bolo-solo V2.6.4 SnakeYAML deserialization vulnerability |
|---|
| الوصف | In the Bolo-Solo v2.6.4_stable version, the /import/markdown interface, when processing the Markdown import files uploaded by users, uses the SnakeYAML library to deserialize the YAML format metadata. However, it does not perform any security checks or type restrictions on the input content. Attackers can construct import files containing malicious YAML payloads, which will trigger arbitrary code execution during the deserialization process on the server side, thereby completely controlling the target server. |
|---|
| المصدر | ⚠️ https://github.com/bolo-blog/bolo-solo/issues/325 |
|---|
| المستخدم | MaoQiu (UID 94327) |
|---|
| ارسال | 19/01/2026 10:22 AM (3 أشهر منذ) |
|---|
| الاعتدال | 30/01/2026 09:00 AM (11 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 343485 [bolo-solo حتى 2.6.4 SnakeYAML BackupService.java importMarkdownsSync تجاوز الصلاحيات] |
|---|
| النقاط | 20 |
|---|