In Yarn before 1.21.1, the package install functionality can be abused to generate arbitrary symlinks on the host filesystem by using specially crafted "bin" keys. Existing files could be overwritten depending on the current user permission set.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0291 | In Yarn before 1.21.1, the package install functionality can be abused to generate arbitrary symlinks on the host filesystem by using specially crafted "bin" keys. Existing files could be overwritten depending on the current user permission set. |
Github GHSA |
GHSA-5xf4-f2fq-f69j | Yarn Improper link resolution before file access (Link Following) |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-08-04T22:32:01.551Z
Reserved: 2019-04-03T00:00:00
Link: CVE-2019-10773
No data.
Status : Modified
Published: 2019-12-16T20:15:14.477
Modified: 2024-11-21T04:19:53.623
Link: CVE-2019-10773
OpenCVE Enrichment
No data.
EUVD
Github GHSA