In Yarn before 1.21.1, the package install functionality can be abused to generate arbitrary symlinks on the host filesystem by using specially crafted "bin" keys. Existing files could be overwritten depending on the current user permission set.
References
Configurations
History
21 Nov 2024, 04:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2020:0475 - | |
References | () https://blog.daniel-ruf.de/critical-design-flaw-npm-pnpm-yarn/ - Exploit, Third Party Advisory | |
References | () https://github.com/yarnpkg/yarn/commit/039bafd74b7b1a88a53a54f8fa6fa872615e90e7 - Patch, Third Party Advisory | |
References | () https://github.com/yarnpkg/yarn/issues/7761#issuecomment-565493023 - Exploit, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3HIZW4NZVV5QY5WWGW2JRP3FHYKZ6ZJ5/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITY5BC63CCC647DFNUQRQ5AJDKUKUNBI/ - | |
References | () https://snyk.io/vuln/SNYK-JS-YARN-537806%2C - |
07 Nov 2023, 03:02
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-12-16 20:15
Updated : 2024-11-21 04:19
NVD link : CVE-2019-10773
Mitre link : CVE-2019-10773
CVE.ORG link : CVE-2019-10773
JSON object : View
Products Affected
yarnpkg
- yarn
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')