Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.Test your applications
7 Apr 2019
5 Apr 2019
Introduced: 5 Apr 2019CWE-94 Open this link in a new tab
How to fix?
js-yaml to version 3.13.1 or higher.
js-yaml is a human-friendly data serialization language.
Affected versions of this package are vulnerable to Arbitrary Code Execution. When an object with an executable
toString() property used as a map key, it will execute that function. This happens only for
load(), which should not be used with untrusted data anyway.
safeLoad() is not affected because it can't parse functions.