The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
The product initializes or sets a resource with a default that is intended to be changed by the product’s installer, administrator, or maintainer, but the default is not secure.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Grunt | Gruntjs | * | 1.3.0 (excluding) |
| Grunt | Ubuntu | bionic | * |
| Grunt | Ubuntu | esm-apps/bionic | * |
| Grunt | Ubuntu | esm-apps/focal | * |
| Grunt | Ubuntu | focal | * |
| Grunt | Ubuntu | groovy | * |
| Grunt | Ubuntu | trusty | * |
| Grunt | Ubuntu | upstream | * |