mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-30 10:10:35 +00:00
19 lines
796 B
Markdown
19 lines
796 B
Markdown
![]() |
### [CVE-2013-4660](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4660)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://nealpoole.com/blog/2013/06/code-execution-via-yaml-in-js-yaml-nodejs-module/
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ContainerSolutions/node-hack
|
||
|
- https://github.com/lalyos/docker-security-course
|
||
|
|