Lucene search

K
cvelistSnykCVELIST:CVE-2020-7729
HistorySep 03, 2020 - 9:00 a.m.

CVE-2020-7729 Arbitrary Code Execution

2020-09-0309:00:15
snyk
www.cve.org
7

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/RL:O

AI Score

7.1

Confidence

High

EPSS

0.009

Percentile

82.3%

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.

CNA Affected

[
  {
    "product": "grunt",
    "vendor": "n/a",
    "versions": [
      {
        "lessThan": "1.3.0",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/RL:O

AI Score

7.1

Confidence

High

EPSS

0.009

Percentile

82.3%