Arbitrary Code Execution in grunt
High severity
GitHub Reviewed
Published
May 6, 2021
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
Sep 3, 2020
Reviewed
May 4, 2021
Published to the GitHub Advisory Database
May 6, 2021
Last updated
Feb 1, 2023
The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
References