提交 #741899: bolo-solo V2.6.4 SnakeYAML deserialization vulnerability信息

标题bolo-solo V2.6.4 SnakeYAML deserialization vulnerability
描述In the Bolo-Solo v2.6.4_stable version, the /import/markdown interface, when processing the Markdown import files uploaded by users, uses the SnakeYAML library to deserialize the YAML format metadata. However, it does not perform any security checks or type restrictions on the input content. Attackers can construct import files containing malicious YAML payloads, which will trigger arbitrary code execution during the deserialization process on the server side, thereby completely controlling the target server.
来源⚠️ https://github.com/bolo-blog/bolo-solo/issues/325
用户
 MaoQiu (UID 94327)
提交2026-01-19 10時22分 (3 月前)
管理2026-01-30 09時00分 (11 days later)
状态已接受
VulDB条目343485 [bolo-solo 直到 2.6.4 SnakeYAML BackupService.java importMarkdownsSync 权限提升]
积分20

Do you want to use VulDB in your project?

Use the official API to access entries easily!