Versions of js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file. Objects that have toString as key, JavaScript code as value and are used as explicit mapping keys allow attackers to execute the supplied code through the load() function. The safeLoad() function is unaffected.
An example payload is
{ toString: !<tag:yaml.org,2002:js/function> 'function (){return Date.now()}' } : 1
which returns the object
{
"1553107949161": 1
}
Recommendation
Upgrade to version 3.13.1.
Release Notes
nodeca/js-yaml
### [`v3.13.1`](https://togithub.com/nodeca/js-yaml/blob/master/CHANGELOG.md#3131---2019-04-05)
[Compare Source](https://togithub.com/nodeca/js-yaml/compare/3.13.0...3.13.1)
##### Security
- Fix possible code execution in (already unsafe) `.load()`, [#480](https://togithub.com/nodeca/js-yaml/issues/480).
Renovate configuration
:date: Schedule: "" (UTC).
:vertical_traffic_light: Automerge: Disabled by config. Please merge this manually once you are satisfied.
:recycle: Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
:no_bell: Ignore: Close this PR and you won't be reminded about this update again.
[ ] If you want to rebase/retry this PR, check this box
This PR contains the following updates:
3.13.0
->3.13.1
GitHub Vulnerability Alerts
GHSA-8j8c-7jfh-h6hx
Versions of
js-yaml
prior to 3.13.1 are vulnerable to Code Injection. Theload()
function may execute arbitrary code injected through a malicious YAML file. Objects that havetoString
as key, JavaScript code as value and are used as explicit mapping keys allow attackers to execute the supplied code through theload()
function. ThesafeLoad()
function is unaffected.An example payload is
{ toString: !<tag:yaml.org,2002:js/function> 'function (){return Date.now()}' } : 1
which returns the object { "1553107949161": 1 }Recommendation
Upgrade to version 3.13.1.
Release Notes
nodeca/js-yaml
### [`v3.13.1`](https://togithub.com/nodeca/js-yaml/blob/master/CHANGELOG.md#3131---2019-04-05) [Compare Source](https://togithub.com/nodeca/js-yaml/compare/3.13.0...3.13.1) ##### Security - Fix possible code execution in (already unsafe) `.load()`, [#480](https://togithub.com/nodeca/js-yaml/issues/480).Renovate configuration
:date: Schedule: "" (UTC).
:vertical_traffic_light: Automerge: Disabled by config. Please merge this manually once you are satisfied.
:recycle: Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
:no_bell: Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by WhiteSource Renovate. View repository job log here.