CVE-2013-4660
Published Jun 28, 2013
Last updated 11 years ago
Overview
- Description
- The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A4573C1-8588-48B7-A9E5-2966F1519DF6", "versionEndIncluding": "2.0.4" }, { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:0.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E26BD514-E20B-4AF1-ABAB-B7C135213921" }, { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:0.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BCBBB48-04B2-4EF4-A757-27D0ADDB3010" }, { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:0.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7EE38B21-4065-4A89-8ED9-9F94F28A4CF4" }, { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:0.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F80D6361-83AF-4F30-B8FB-BF04195595E7" }, { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:0.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A87DBE70-409D-4B64-8912-105399EAE3AB" }, { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:0.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FAA83ADA-5A9C-45B7-833D-029AFCE0A74C" }, { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:0.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "977E7C40-75E9-4476-BB8E-CBDD62328E2F" }, { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:0.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31C7D7EB-3757-4ECA-A4F9-0BB0674DE6C4" }, { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:0.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B710D0C1-06CC-4400-9970-5D333A71396B" }, { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:0.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD003662-EB37-470B-BF77-6B10B31A5DA3" }, { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:0.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2A704DB-70CB-4F3B-A208-622E08CD61A4" }, { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D70A306F-6EB3-446F-9323-BA22D808CAFA" }, { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66B2DB7C-8C2E-430A-9FF8-769CA40E6BF3" }, { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E86AD962-29D6-4B00-867D-91DC8CC8C8C9" }, { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5FEEBE9F-232D-48F1-99DC-6AFF6DCB1D55" }, { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9344BD7B-A88C-4FD6-89D8-67144A5C9738" }, { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFE961FE-5647-4B48-B555-2E932486E4C4" }, { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DDDE2A4-6441-4FB4-9C0A-4803C216CFE8" }, { "criteria": "cpe:2.3:a:js-yaml_project:js-yaml:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "63CBC2C2-89E1-49BE-8021-06A72AC30337" } ], "operator": "OR" } ] } ]