Arbitrary Code Execution Affecting jingo package, versions <1.9.6
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-JINGO-595966
- published 29 Jul 2020
- disclosed 29 Jul 2020
- credit Snyk Security Team
How to fix?
Upgrade jingo
to version 1.9.6 or higher.
Overview
jingo is a git based wiki engine written for node.js, with a decent design, a search capability and a good typography.
Affected versions of this package are vulnerable to Arbitrary Code Execution due to the default usage of the function yaml.load()
of the package js-yaml
instead of its secure replacement , yaml.safeLoad()
.
References
CVSS Scores
version 3.1