Apache ShardingSphere(incubator) deserialization vulnerability

Overview :

In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere’s web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE.

Affected Product(s) :

Solution :

Mitigation: 4.0.0-RC3 and 4.0.0 users should upgrade to 4.0.1

Example: An attacker can use untrusted data to fill in the DataSource Config after login the sharding-ui.

Credit: This issue was discovered by WuXiong of QI`ANXIN YUNYING Labs.

References:

Facebook
Twitter
LinkedIn

Recent Blog Posts

Cybersecurity Awareness Month 2025
Layer 7 Attack Recovery Guide Step by Step (2025)
Top 12 Features Every MSSP Needs in a WAAP Platform (2025 Guide)
Top 8 Cybersecurity Challenges Indian Enterprises Face in 2025
Best Tools to Identify Broken Access Control in APIs

WAF Solution