Deserialization Code Execution in js-yaml
Critical severity
GitHub Reviewed
Published
Oct 24, 2017
to the GitHub Advisory Database
•
Updated Jan 9, 2023
Description
Published to the GitHub Advisory Database
Oct 24, 2017
Reviewed
Jun 16, 2020
Last updated
Jan 9, 2023
Versions 2.0.4 and earlier of
js-yaml
are affected by a code execution vulnerability in the YAML deserializer.Proof of Concept
Recommendation
Update js-yaml to version 2.0.5 or later, and ensure that all instances where the
.load()
method is called are updated to use.safeLoad()
instead.References