Lucene search

K
nodejsAnonymousNODEJS:1684
HistoryMay 06, 2021 - 6:28 p.m.

Arbitrary Code Execution in grunt

2021-05-0618:28:27
Anonymous
www.npmjs.com
60
arbitrary code execution
grunt
vulnerable
upgrade
js-yaml

EPSS

0.009

Percentile

82.3%

Overview

Versions of grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.

Recommendation

Upgrade to version 1.3.0 or later

References