CVE-2013-4660
JS-YAML <2.0.5 - RCE
Title source: llmDescription
The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalmultiple
https://www.exploit-db.com/exploits/28655
metasploit
WORKING POC
EXCELLENT
by Neal Poole, joev · rubypocnodejs
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/fileformat/nodejs_js_yaml_load_code_exec.rb
Scores
EPSS
0.6451
EPSS Percentile
98.5%
Details
CWE
CWE-20
Status
published
Products (21)
nodeca/js-yaml
0.2.0
nodeca/js-yaml
0.2.1
nodeca/js-yaml
0.2.2
nodeca/js-yaml
0.3.0
nodeca/js-yaml
0.3.1
nodeca/js-yaml
0.3.2
nodeca/js-yaml
0.3.3
nodeca/js-yaml
0.3.4
nodeca/js-yaml
0.3.5
nodeca/js-yaml
0.3.6
... and 11 more
Published
Jun 28, 2013
Tracked Since
Feb 18, 2026