Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security: JS-yaml #1845

Closed
1 task done
pmespresso opened this issue Sep 9, 2019 · 0 comments
Closed
1 task done

Security: JS-yaml #1845

pmespresso opened this issue Sep 9, 2019 · 0 comments
Labels
complexity: easy Easy complexity contribution welcome Contributions welcome good first issue Good for newcomers priority: medium Medium priority issue

Comments

@pmespresso
Copy link
Contributor

  • I confirm that this is an issue rather than a question.

Bug report

Steps to reproduce

What is expected?

js-yaml should be version higher than 1.13.1

What is actually happening?

it is not and it is a security vulnerability.

nodeca/js-yaml#475
Versions js-yaml prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service.

nodeca/js-yaml#480
Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.

"js-yaml": "^3.11.0",

Other relevant information

  • found this from Github's automatic security report on a project that has a dependency that has a dependency that has a dependency that uses vuepress...
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
complexity: easy Easy complexity contribution welcome Contributions welcome good first issue Good for newcomers priority: medium Medium priority issue
Projects
None yet
Development

No branches or pull requests

2 participants