Description
In Yarn before 1.21.1, the package install functionality can be abused to generate arbitrary symlinks on the host filesystem by using specially crafted "bin" keys. Existing files could be overwritten depending on the current user permission set.
Remediation
References
https://github.com/yarnpkg/yarn/issues/7761#issuecomment-565493023
https://github.com/yarnpkg/yarn/commit/039bafd74b7b1a88a53a54f8fa6fa872615e90e7
https://blog.daniel-ruf.de/critical-design-flaw-npm-pnpm-yarn/
https://access.redhat.com/errata/RHSA-2020:0475
https://snyk.io/vuln/SNYK-JS-YARN-537806%2C
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITY5BC63CCC647DFNUQRQ5AJDKUKUNBI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3HIZW4NZVV5QY5WWGW2JRP3FHYKZ6ZJ5/
Related Vulnerabilities
CVE-2020-28469 Vulnerability in maven package org.webjars.npm:glob-parent
CVE-2023-26136 Vulnerability in maven package org.webjars.bowergithub.salesforce:tough-cookie
CVE-2022-29078 Vulnerability in maven package org.webjars.npm:ejs
CVE-2022-43419 Vulnerability in maven package org.jenkins-ci.plugins:katalon