logo

CVE-2020-7729 grunt

Package

Manager: npm
Name: grunt
Vulnerable Version: >=0 <1.3.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.02395 pctl0.84459

Details

Arbitrary Code Execution in grunt The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.

Metadata

Created: 2021-05-06T18:27:18Z
Modified: 2021-05-04T22:57:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-m5pj-vjjf-4m3h/GHSA-m5pj-vjjf-4m3h.json
CWE IDs: ["CWE-1188"]
Alternative ID: GHSA-m5pj-vjjf-4m3h
Finding: F164
Auto approve: 1