walletgeneratornet / WalletGenerator.net

Universal JavaScript Client-Side Wallet Generator
http://walletgenerator.net/
650 stars 558 forks source link

Arbitrary Code Execution #252

Open larrycameron80 opened 5 years ago

larrycameron80 commented 5 years ago

Arbitrary Code Execution Vulnerable module: js-yaml Introduced through: grunt@0.4.5 Detailed paths Introduced through: walletgenerator.net@walletgeneratornet/WalletGenerator.net › grunt@0.4.5 › js-yaml@2.0.5 Remediation: Upgrade to grunt@1.0.4. Overview js-yaml is a human-friendly data serialization language.

Affected versions of this package are vulnerable to Arbitrary Code Execution. When an object with an executable toString() property used as a map key, it will execute that function. This happens only for load(), which should not be used with untrusted data anyway. safeLoad() is not affected because it can't parse functions.

Arbitrary Code Execution vulnerability