GHSA-m5pj-vjjf-4m3h

Suggest an improvement
Source
https://github.com/advisories/GHSA-m5pj-vjjf-4m3h
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-m5pj-vjjf-4m3h/GHSA-m5pj-vjjf-4m3h.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-m5pj-vjjf-4m3h
Aliases
  • CVE-2020-7729
  • SNYK-JAVA-ORGWEBJARSNPM-607922
  • SNYK-JS-GRUNT-597546
Published
2021-05-06T18:27:18Z
Modified
2023-11-01T05:28:35.208768Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Arbitrary Code Execution in grunt
Details

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.

Database specific
{
    "nvd_published_at": "2020-09-03T09:15:00Z",
    "cwe_ids": [
        "CWE-1188"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2021-05-04T22:57:23Z"
}
References

Affected packages

npm / grunt

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.0