CVE-2020-7729Initialization of a Resource with an Insecure Default in Grunt

Severity
7.1HIGHNVD
EPSS
2.4%
top 14.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 3
Latest updateFeb 7

Description

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages5 packages

CVEListV5gruntjs/gruntunspecified1.3.0
NVDgruntjs/grunt< 1.3.0
npmgruntjs/grunt< 1.3.0
Debiangruntjs/grunt< 1.3.0-1+3
Ubuntugruntjs/grunt< 1.0.1-8ubuntu0.1+3

Also affects: Debian Linux 9.0, Ubuntu Linux 18.04

Patches

🔴Vulnerability Details

6
OSV
grunt vulnerabilities2023-02-07
GHSA
Arbitrary Code Execution in grunt2021-05-06
OSV
Arbitrary Code Execution in grunt2021-05-06
OSV
grunt vulnerability2020-10-20
OSV
CVE-2020-7729: The package grunt before 12020-09-03

📋Vendor Advisories

3
Ubuntu
Grunt vulnerabilities2023-02-07
Ubuntu
Grunt vulnerability2020-10-20
Debian
CVE-2020-7729: grunt - The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to...2020

💬Community

3
Bugzilla
CVE-2020-7729 nodejs-grunt: use of the unsafe load function from js-yaml package can lead to ACE [fedora-all]2020-09-03
Bugzilla
CVE-2020-7729 nodejs-grunt: use of the unsafe load function from js-yaml package can lead to ACE [epel-all]2020-09-03
Bugzilla
CVE-2020-7729 nodejs-grunt: use of the unsafe load function from js-yaml package can lead to ACE2020-09-03
CVE-2020-7729 — Gruntjs Grunt vulnerability | cvebase