CVE-2013-4660

Severity CVSS v4.0:
Pending analysis
Type:
CWE-20 Input Validation
Publication date:
28/06/2013
Last modified:
02/12/2025

Description

The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:nodeca:js-yaml:*:*:*:*:*:*:*:* 2.0.4 (including)
cpe:2.3:a:nodeca:js-yaml:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.3.4:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.3.5:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.3.6:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:0.3.7:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:nodeca:js-yaml:1.0.2:*:*:*:*:*:*:*