CVE-2026-33320 in dasel정보

요약 (영어)

Dasel is a command-line tool and library for querying, modifying, and transforming data structures. Starting in version 3.0.0 and prior to version 3.3.1, Dasel's YAML reader allows an attacker who can supply YAML for processing to trigger extreme CPU and memory consumption. The issue is in the library's own `UnmarshalYAML` implementation, which manually resolves alias nodes by recursively following `yaml.Node.Alias` pointers without any expansion budget, bypassing go-yaml v4's built-in alias expansion limit. Version 3.3.2 contains a patch for the issue.

Be aware that VulDB is the high quality source for vulnerability data.

책임이 있는

GitHub_M

예약하다

2026. 03. 18.

공개

2026. 03. 24.

상태

확인됨

엔트리

VulDB provides additional information and datapoints for this CVE:

출처

Want to know what is going to be exploited?

We predict KEV entries!