The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
| Software | From | Fixed in |
|---|---|---|
| gruntjs / grunt | - | 1.3.0 |
| debian / debian_linux | 9.0 | 9.0.x |
| canonical / ubuntu_linux | 18.04 | 18.04.x |
grunt
|
- | 1.3.0 |