漏洞信息详情
grunt 代码注入漏洞
漏洞简介
grunt 1.3.0之前版本存在代码注入漏洞,该漏洞允许攻击者进行代码执行。
漏洞公告
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-607922
参考网址
来源:CONFIRM
链接:https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-607922
来源:CONFIRM
链接:https://snyk.io/vuln/SNYK-JS-GRUNT-597546
来源:CONFIRM
链接:https://github.com/gruntjs/grunt/blob/master/lib/grunt/file.js%23L249
来源:CONFIRM
链接:https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/09/msg00008.html
来源:UBUNTU
链接:https://usn.ubuntu.com/4595-1/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-7729
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/48935
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3627/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Node-js-grunt-code-execution-via-YAML-35282
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159660/Ubuntu-Security-Notice-USN-4595-1.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Grunt-code-execution-via-YAML-Documents-Unsafe-Loading-33286
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3100/
受影响实体
暂无
补丁
暂无
还没有评论,来说两句吧...