Lucene search

K
osvGoogleOSV:GHSA-M5PJ-VJJF-4M3H
HistoryMay 06, 2021 - 6:27 p.m.

Arbitrary Code Execution in grunt

2021-05-0618:27:18
Google
osv.dev
12
arbitrary code execution
grunt
package
js-yaml
vulnerable
default usage
secure replacement
safeload
file readyaml

EPSS

0.009

Percentile

82.3%

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.