CVE Vulnerabilities

CVE-2020-7729

Initialization of a Resource with an Insecure Default

Published: Sep 03, 2020 | Modified: Nov 21, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.6 MEDIUM
AV:N/AC:H/Au:S/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.

Weakness

The product initializes or sets a resource with a default that is intended to be changed by the product’s installer, administrator, or maintainer, but the default is not secure.

Affected Software

Name Vendor Start Version End Version
Grunt Gruntjs * 1.3.0 (excluding)
Grunt Ubuntu bionic *
Grunt Ubuntu esm-apps/bionic *
Grunt Ubuntu esm-apps/focal *
Grunt Ubuntu focal *
Grunt Ubuntu groovy *
Grunt Ubuntu trusty *
Grunt Ubuntu upstream *

References