EIQ-2019-0020
    
| 
     ID  | 
                
     EIQ-2019-0020  | 
        
| 
     CVE  | 
                
     -  | 
        
| 
     Description  | 
                
     js-yaml 3.13.0 and earlier are vulnerable to code injection  | 
        
| 
     Date  | 
                
     24 Apr 2019  | 
        
| 
     Severity  | 
                
     3 - HIGH  | 
        
| 
     CVSSv3 score  | 
                
     CVSSv3 score not available on NIST NVD.  | 
        
| 
     Status  | 
                
     
  | 
        
| 
     Assessment  | 
                
     js-yaml versions 3.13.0 and earlier are vulnerable to code injection. The safeLoad() method is unaffected because it cannot parse functions.     
This vulnerability is a false positive: i    
    
t affects a sub-dependency of Storybook.    
  | 
        
| 
     Mitigation  | 
                
     Upgrade js-yaml to version 3.13.1 or later. At the moment, it is not possible to globally upgrade js-yaml, because it occurs at least once as a sub-dependency. We cannot control these dependencies.  | 
        
| 
     Affected versions  | 
                
     None  | 
        
| 
     Notes  | 
                
     For more information, see:  | 
        
< Back to all security issues and mitigation actions
In release notes 2.4.0
In release notes 2.5.0
In release notes 2.6.0