#VU25736 Improper validation of integrity check value in yarn
Published: March 3, 2020
yarn
Yarn
Description
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to the software of the affected products does not check the integrity. A remote attacker can pollute yarn cache via a crafted yarn.lock file and place a malicious package into cache under any name/version, bypassing both integrity and hash checks in yarn.lock so that any future installs of that package will install the fake version (regardless of integrity and hashes).