HTTP: NodeJS JS YAML Remote Code Execution
This signature detects attempts to exploit a known vulnerability against NodeJS. A successful attack can lead to arbitrary code execution.
Extended Description
The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.
Affected Products
Js-yaml_project js-yaml
References
BugTraq: 60867
CVE: CVE-2013-4660
URL: https://nealpoole.com/blog/2013/06/code-execution-via-yaml-in-js-yaml-nodejs-module/
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Js-yaml_project
6.8