Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | N/A |
CWE-ID | CWE-354 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
yarn Web applications / Modules and components for CMS |
Vendor | Yarn |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU25736
Risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-354 - Improper Validation of Integrity Check Value
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to the software of the affected products does not check the integrity. A remote attacker can pollute yarn cache via a crafted yarn.lock file and place a malicious package into cache under any name/version, bypassing both integrity and hash checks in yarn.lock so that any future installs of that package will install the fake version (regardless of integrity and hashes).
Install updates from vendor's website.
Vulnerable software versionsyarn: 0.2.0 - 1.18.0
External linkshttp://snyk.io/vuln/SNYK-JS-YARN-557182
http://github.com/yarnpkg/yarn/commit/0474b8c66a8ea298f5e4dedc67b2de464297ad1c
http://hackerone.com/reports/703138
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.