Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xxvw-45rp-3mj2

Опубликовано: 24 окт. 2017
Источник: github
Github: Прошло ревью

Описание

Deserialization Code Execution in js-yaml

Versions 2.0.4 and earlier of js-yaml are affected by a code execution vulnerability in the YAML deserializer.

Proof of Concept

const yaml = require('js-yaml'); const x = `test: !!js/function > function f() { console.log(1); }();` yaml.load(x);

Recommendation

Update js-yaml to version 2.0.5 or later, and ensure that all instances where the .load() method is called are updated to use .safeLoad() instead.

Пакеты

Наименование

js-yaml

npm
Затронутые версииВерсия исправления

< 2.0.5

2.0.5

EPSS

Процентиль: 98%
0.65611
Средний

Дефекты

CWE-20

Связанные уязвимости

nvd
почти 12 лет назад

The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.

EPSS

Процентиль: 98%
0.65611
Средний

Дефекты

CWE-20