EIQ-2019-0020
|
ID |
EIQ-2019-0020 |
|
CVE |
- |
|
Description |
js-yaml 3.13.0 and earlier are vulnerable to code injection |
|
Date |
24 Apr 2019 |
|
Severity |
3 - HIGH |
|
CVSSv3 score |
CVSSv3 score not available on NIST NVD. |
|
Status |
|
|
Assessment |
js-yaml versions 3.13.0 and earlier are vulnerable to code injection. The safeLoad() method is unaffected because it cannot parse functions.
This vulnerability is a false positive: i
t affects a sub-dependency of Storybook.
|
|
Mitigation |
Upgrade js-yaml to version 3.13.1 or later. At the moment, it is not possible to globally upgrade js-yaml, because it occurs at least once as a sub-dependency. We cannot control these dependencies. |
|
Affected versions |
None |
|
Notes |
For more information, see: |
< Back to all security issues and mitigation actions
In release notes 2.4.0
In release notes 2.5.0
In release notes 2.6.0