mirror of
https://github.com/0xMarcio/cve.git
synced 2025-12-30 04:49:42 +00:00
1.1 KiB
1.1 KiB
CVE-2020-7729
Description
The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
POC
Reference
Github
- https://github.com/404notf0und/CVE-Flow
- https://github.com/ARPSyndicate/cvemon
- https://github.com/HotDB-Community/HotDB-Engine
- https://github.com/Live-Hack-CVE/CVE-2020-7729
- https://github.com/cdcavell/cdcavell.name
- https://github.com/cdcavell/old
- https://github.com/shawnhooper/restful-localized-scripts
- https://github.com/shawnhooper/wpml-rest-api
- https://github.com/tmalbonph/grunt-swagger-tools