Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-7729

Опубликовано: 03 сент. 2020
Источник: debian

Описание

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gruntfixed1.3.0-1package
gruntfixed1.0.1-8+deb10u1busterpackage

Примечания

  • https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7

  • https://snyk.io/vuln/SNYK-JS-GRUNT-597546

Связанные уязвимости

CVSS3: 7.1
ubuntu
больше 5 лет назад

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.

CVSS3: 7.1
nvd
больше 5 лет назад

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.

CVSS3: 7.1
github
почти 5 лет назад

Arbitrary Code Execution in grunt