Description

The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.

Remediation

References

Related Vulnerabilities

Severity

Critical

Classification

CWE-20

Tags

Exploit Vendor Advisory