CVE Vulnerabilities

CVE-2020-7729

Initialization of a Resource with an Insecure Default

Published: Sep 03, 2020 | Modified: Nov 21, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.6 MEDIUM
AV:N/AC:H/Au:S/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.

Weakness

The product initializes or sets a resource with a default that is intended to be changed by the product’s installer, administrator, or maintainer, but the default is not secure.

Affected Software

NameVendorStart VersionEnd Version
GruntGruntjs*1.3.0 (excluding)
GruntUbuntubionic*
GruntUbuntuesm-apps/bionic*
GruntUbuntuesm-apps/focal*
GruntUbuntufocal*
GruntUbuntugroovy*
GruntUbuntutrusty*
GruntUbuntuupstream*

References