Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-10773

Опубликовано: 16 дек. 2019
Источник: debian
EPSS Низкий

Описание

In Yarn before 1.21.1, the package install functionality can be abused to generate arbitrary symlinks on the host filesystem by using specially crafted "bin" keys. Existing files could be overwritten depending on the current user permission set.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
node-yarnpkgfixed1.21.1-1package
node-yarnpkgno-dsabusterpackage

Примечания

  • https://github.com/yarnpkg/yarn/issues/7761#issuecomment-565493023

  • https://blog.daniel-ruf.de/critical-design-flaw-npm-pnpm-yarn/

  • https://github.com/yarnpkg/yarn/commit/039bafd74b7b1a88a53a54f8fa6fa872615e90e7

  • https://snyk.io/vuln/SNYK-JS-YARN-537806

EPSS

Процентиль: 67%
0.00546
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 6 лет назад

In Yarn before 1.21.1, the package install functionality can be abused to generate arbitrary symlinks on the host filesystem by using specially crafted "bin" keys. Existing files could be overwritten depending on the current user permission set.

CVSS3: 7.8
redhat
около 6 лет назад

In Yarn before 1.21.1, the package install functionality can be abused to generate arbitrary symlinks on the host filesystem by using specially crafted "bin" keys. Existing files could be overwritten depending on the current user permission set.

CVSS3: 7.8
nvd
около 6 лет назад

In Yarn before 1.21.1, the package install functionality can be abused to generate arbitrary symlinks on the host filesystem by using specially crafted "bin" keys. Existing files could be overwritten depending on the current user permission set.

CVSS3: 7.8
github
почти 6 лет назад

Yarn Improper link resolution before file access (Link Following)

EPSS

Процентиль: 67%
0.00546
Низкий