Skip to content

Arbitrary Code Execution in grunt

High severity GitHub Reviewed Published May 6, 2021 to the GitHub Advisory Database • Updated Feb 1, 2023

Package

npm grunt (npm)

Affected versions

< 1.3.0

Patched versions

1.3.0

Description

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.

References

Published by the National Vulnerability Database Sep 3, 2020
Reviewed May 4, 2021
Published to the GitHub Advisory Database May 6, 2021
Last updated Feb 1, 2023

Severity

High
7.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
Low
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2020-7729

GHSA ID

GHSA-m5pj-vjjf-4m3h

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.