Lucene search

K
githubGitHub Advisory DatabaseGHSA-M5PJ-VJJF-4M3H
HistoryMay 06, 2021 - 6:27 p.m.

Arbitrary Code Execution in grunt

2021-05-0618:27:18
CWE-1188
GitHub Advisory Database
github.com
48
arbitrary code execution
grunt
package
js-yaml
secure replacement
software
vulnerability

CVSS2

4.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:S/C:P/I:P/A:P

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

EPSS

0.009

Percentile

82.3%

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.

Affected configurations

Vulners
Node
grunt-karma_projectgrunt-karmaRange<1.3.0node.js
VendorProductVersionCPE
grunt-karma_projectgrunt-karma*cpe:2.3:a:grunt-karma_project:grunt-karma:*:*:*:*:*:node.js:*:*

CVSS2

4.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:S/C:P/I:P/A:P

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

EPSS

0.009

Percentile

82.3%