We use opensearch-x-content:2.0.0 and org.opensearch.client:opensearch-rest-high-level-client:2.0.0 jars in our application, which uses a vulnerable artifact snakeyaml. Even the most recent snakeyaml version v1.33 has a high vulnerability that can lead to remote code execution :- https://nvd.nist.gov/vuln/detail/CVE-2022-1471
Snakeyaml hasn't offered an updated safe version so far. Since we use Opensearch, snakeyaml library is transitively added as well.
Spring boot came up with their analysis on why their use-case of snakeyaml is not vulnerable, even though they use it :- spring-projects/spring-boot#33457
Is there a plan by Opensearch to address this challenge/vulnerability that comes with using Snakeyaml? Please let me know if there's any update.
We use opensearch-x-content:2.0.0 and org.opensearch.client:opensearch-rest-high-level-client:2.0.0 jars in our application, which uses a vulnerable artifact snakeyaml. Even the most recent snakeyaml version v1.33 has a high vulnerability that can lead to remote code execution :- https://nvd.nist.gov/vuln/detail/CVE-2022-1471
Snakeyaml hasn't offered an updated safe version so far. Since we use Opensearch, snakeyaml library is transitively added as well.
Spring boot came up with their analysis on why their use-case of snakeyaml is not vulnerable, even though they use it :- spring-projects/spring-boot#33457
Is there a plan by Opensearch to address this challenge/vulnerability that comes with using Snakeyaml? Please let me know if there's any update.