-
-
Notifications
You must be signed in to change notification settings - Fork 34
Open
Description
js-yaml -> gray-matter -> grunt-assemble
Versions of js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file. Objects that have toString as key, JavaScript code as value and are used as explicit mapping keys allow attackers to execute the supplied code through the load() function. The safeLoad() function is unaffected.
An example payload is
{ toString: !tag:yaml.org,2002:js/function 'function (){return Date.now()}' } : 1
which returns the object
{
"1553107949161": 1
}
Recommendation
Upgrade to version 3.13.1.
Metadata
Metadata
Assignees
Labels
No labels