Improper validation of integrity check value in yarn - #VU25736

 

Improper validation of integrity check value in yarn - #VU25736

Published: March 3, 2020


Vulnerability identifier: #VU25736
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: N/A
CWE-ID: CWE-354
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Yarn
Affected software:
yarn

Detailed vulnerability description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the software of the affected products does not check the integrity. A remote attacker can pollute yarn cache via a crafted yarn.lock file and place a malicious package into cache under any name/version, bypassing both integrity and hash checks in yarn.lock so that any future installs of that package will install the fake version (regardless of integrity and hashes).


Remediation

Install updates from vendor's website.

Sources