CVE-2019-15608

The package integrity validation in yarn < 1.19.0 contains a TOCTOU vulnerability where the hash is computed before writing a package to cache. It's not computed again when reading from the cache. This may lead to a cache pollution attack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yarnpkg:yarn:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:29

Type Values Removed Values Added
References () https://github.com/yarnpkg/yarn/blob/master/CHANGELOG.md#1190 - () https://github.com/yarnpkg/yarn/blob/master/CHANGELOG.md#1190 -
References () https://github.com/yarnpkg/yarn/commit/0474b8c66a8ea298f5e4dedc67b2de464297ad1c - () https://github.com/yarnpkg/yarn/commit/0474b8c66a8ea298f5e4dedc67b2de464297ad1c -
References () https://hackerone.com/reports/703138 - Exploit, Mitigation, Third Party Advisory () https://hackerone.com/reports/703138 - Exploit, Mitigation, Third Party Advisory

Information

Published : 2020-03-15 18:15

Updated : 2024-11-21 04:29


NVD link : CVE-2019-15608

Mitre link : CVE-2019-15608

CVE.ORG link : CVE-2019-15608


JSON object : View

Products Affected

yarnpkg

  • yarn
CWE
CWE-840

Business Logic Errors

CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition