HIGH · 7.1

CVE-2020-7729

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside gru...

Vulnerability Description

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.

CVSS Score

7.1

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
GruntjsGrunt< 1.3.0
DebianDebian Linux9.0
CanonicalUbuntu Linux18.04

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-7729?

CVE-2020-7729 is a vulnerability with a CVSS score of 7.1 (HIGH). The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside gru...

How severe is CVE-2020-7729?

CVE-2020-7729 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-7729?

Check the references section above for vendor advisories and patch information. Affected products include: Gruntjs Grunt, Debian Debian Linux, Canonical Ubuntu Linux.