Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
js-yaml has prototype pollution in merge (<<)
Vulnerability Description
js-yaml is a JavaScript YAML parser and dumper. In js-yaml before 4.1.1 and 3.14.2, it's possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution (`__proto__`). All users who parse untrusted yaml documents may be impacted. The problem is patched in js-yaml 4.1.1 and 3.14.2. Users can protect against this kind of attack on the server by using `node --disable-proto=delete` or `deno` (in Deno, pollution protection is on by default).
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Vulnerability Type
CWE-1321
Vulnerability Title
JS-YAML 安全漏洞
Vulnerability Description
JS-YAML是Nodeca开源的一个JavaScript YAML解析器和转储器。 JS-YAML 4.1.0及之前版本存在安全漏洞,该漏洞源于解析YAML文档时可能修改原型,可能导致原型污染。
CVSS Information
N/A
Vulnerability Type
N/A