Description
All versions of package shiba are vulnerable to Arbitrary Code Execution due to the default usage of the function load() of the package js-yaml instead of its secure replacement , safeLoad().
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1127 | All versions of package shiba are vulnerable to Arbitrary Code Execution due to the default usage of the function load() of the package js-yaml instead of its secure replacement , safeLoad(). |
Github GHSA |
GHSA-jvf4-g24p-2qgw | Arbitrary Code Execution in shiba |
References
| Link | Providers |
|---|---|
| https://snyk.io/vuln/SNYK-JS-SHIBA-596466 |
|
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-17T02:11:06.591Z
Reserved: 2020-01-21T00:00:00.000Z
Link: CVE-2020-7738
No data.
Status : Modified
Published: 2020-10-02T10:15:13.090
Modified: 2024-11-21T05:37:42.577
Link: CVE-2020-7738
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA