The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.
| Software | From | Fixed in |
|---|---|---|
js-yaml
|
- | 2.0.5 |
| nodeca / js-yaml | - | 2.0.4.x |
| nodeca / js-yaml | 0.2.0 | 0.2.0.x |
| nodeca / js-yaml | 0.2.1 | 0.2.1.x |
| nodeca / js-yaml | 0.2.2 | 0.2.2.x |
| nodeca / js-yaml | 0.3.0 | 0.3.0.x |
| nodeca / js-yaml | 0.3.1 | 0.3.1.x |
| nodeca / js-yaml | 0.3.2 | 0.3.2.x |
| nodeca / js-yaml | 0.3.3 | 0.3.3.x |
| nodeca / js-yaml | 0.3.4 | 0.3.4.x |
| nodeca / js-yaml | 0.3.5 | 0.3.5.x |
| nodeca / js-yaml | 0.3.6 | 0.3.6.x |
| nodeca / js-yaml | 0.3.7 | 0.3.7.x |
| nodeca / js-yaml | 1.0.0 | 1.0.0.x |
| nodeca / js-yaml | 1.0.1 | 1.0.1.x |
| nodeca / js-yaml | 1.0.2 | 1.0.2.x |
| nodeca / js-yaml | 1.0.3 | 1.0.3.x |
| nodeca / js-yaml | 2.0.0 | 2.0.0.x |
| nodeca / js-yaml | 2.0.1 | 2.0.1.x |
| nodeca / js-yaml | 2.0.2 | 2.0.2.x |
| nodeca / js-yaml | 2.0.3 | 2.0.3.x |