Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8j8c-7jfh-h6hx

Опубликовано: 04 июн. 2019
Источник: github
Github: Прошло ревью

Описание

Code Injection in js-yaml

Versions of js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file. Objects that have toString as key, JavaScript code as value and are used as explicit mapping keys allow attackers to execute the supplied code through the load() function. The safeLoad() function is unaffected.

An example payload is { toString: !<tag:yaml.org,2002:js/function> 'function (){return Date.now()}' } : 1 which returns the object { "1553107949161": 1 }

Recommendation

Upgrade to version 3.13.1.

Пакеты

Наименование

js-yaml

npm
Затронутые версииВерсия исправления

< 3.13.1

3.13.1

Дефекты

CWE-94

Дефекты

CWE-94