#VU25736 Improper validation of integrity check value in yarn

 

#VU25736 Improper validation of integrity check value in yarn

Published: March 3, 2020


Vulnerability identifier: #VU25736
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: N/A
CWE-ID: CWE-354
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
yarn
Software vendor:
Yarn

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the software of the affected products does not check the integrity. A remote attacker can pollute yarn cache via a crafted yarn.lock file and place a malicious package into cache under any name/version, bypassing both integrity and hash checks in yarn.lock so that any future installs of that package will install the fake version (regardless of integrity and hashes).


Remediation

Install updates from vendor's website.

External links