Lucene search

K
nodejsNeal PooleNODEJS:16
HistoryOct 17, 2015 - 7:41 p.m.

Deserialization Code Execution

2015-10-1719:41:46
Neal Poole
www.npmjs.com
31

0.936 High

EPSS

Percentile

99.1%

Overview

Versions 2.0.4 and earlier of js-yaml are affected by a code execution vulnerability in the YAML deserializer.

Proof of Concept

const yaml = require('js-yaml');

const x = `test: !!js/function >
function f() { 
console.log(1); 
}();`

yaml.load(x);

Recommendation

Update js-yaml to version 2.0.5 or later, and ensure that all instances where the .load() method is called are updated to use .safeLoad() instead.

References

CPENameOperatorVersion
js-yamllt 2.0.5