You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
No CVE
CWE CWE-94
References: - GitHub PR
Versions of js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file. Objects that have toString as key, JavaScript code as value and are used as explicit mapping keys allow attackers to execute the supplied code through the load() function. The safeLoad() function is unaffected.
An example payload is { toString: !<tag:yaml.org,2002:js/function> 'function (){return Date.now()}' } : 1
which returns the object
{
"1553107949161": 1
} @marshyski
The text was updated successfully, but these errors were encountered:
No CVE
CWE CWE-94
References: - GitHub PR
Versions of
js-yaml
prior to 3.13.1 are vulnerable to Code Injection. Theload()
function may execute arbitrary code injected through a malicious YAML file. Objects that havetoString
as key, JavaScript code as value and are used as explicit mapping keys allow attackers to execute the supplied code through theload()
function. ThesafeLoad()
function is unaffected.An example payload is
{ toString: !<tag:yaml.org,2002:js/function> 'function (){return Date.now()}' } : 1
which returns the object
{
"1553107949161": 1
}
@marshyski
The text was updated successfully, but these errors were encountered: