Lucene search

K
cve[email protected]CVE-2013-4660
HistoryOct 03, 2022 - 4:14 p.m.

CVE-2013-4660

2022-10-0316:14:58
CWE-20
web.nvd.nist.gov
116
cve-2013-4660
js-yaml module
node.js
remote code execution
crafted input
nvd

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.6 High

AI Score

Confidence

Low

0.936 High

EPSS

Percentile

99.1%

The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.

Affected configurations

NVD
Node
js-yaml_projectjs-yamlRange2.0.4
OR
js-yaml_projectjs-yamlMatch0.2.0
OR
js-yaml_projectjs-yamlMatch0.2.1
OR
js-yaml_projectjs-yamlMatch0.2.2
OR
js-yaml_projectjs-yamlMatch0.3.0
OR
js-yaml_projectjs-yamlMatch0.3.1
OR
js-yaml_projectjs-yamlMatch0.3.2
OR
js-yaml_projectjs-yamlMatch0.3.3
OR
js-yaml_projectjs-yamlMatch0.3.4
OR
js-yaml_projectjs-yamlMatch0.3.5
OR
js-yaml_projectjs-yamlMatch0.3.6
OR
js-yaml_projectjs-yamlMatch0.3.7
OR
js-yaml_projectjs-yamlMatch1.0.0
OR
js-yaml_projectjs-yamlMatch1.0.1
OR
js-yaml_projectjs-yamlMatch1.0.2
OR
js-yaml_projectjs-yamlMatch1.0.3
OR
js-yaml_projectjs-yamlMatch2.0.0
OR
js-yaml_projectjs-yamlMatch2.0.1
OR
js-yaml_projectjs-yamlMatch2.0.2
OR
js-yaml_projectjs-yamlMatch2.0.3

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.6 High

AI Score

Confidence

Low

0.936 High

EPSS

Percentile

99.1%