Skip to content

Update gray-matter dep #75

@brenoatgetmomo

Description

@brenoatgetmomo

js-yaml -> gray-matter -> grunt-assemble

Versions of js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file. Objects that have toString as key, JavaScript code as value and are used as explicit mapping keys allow attackers to execute the supplied code through the load() function. The safeLoad() function is unaffected.

An example payload is
{ toString: !tag:yaml.org,2002:js/function 'function (){return Date.now()}' } : 1
which returns the object
{
"1553107949161": 1
}
Recommendation

Upgrade to version 3.13.1.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions