Vulnerability Details : CVE-2020-8131
Arbitrary filesystem write vulnerability in Yarn before 1.22.0 allows attackers to write to any path on the filesystem and potentially lead to arbitrary code execution by forcing the user to install a malicious package.
Vulnerability category: Directory traversal
Products affected by CVE-2020-8131
- cpe:2.3:a:yarnpkg:yarn:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-8131
0.32%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 67 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-8131
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.6
|
5.9
|
NIST |
CWE ids for CVE-2020-8131
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by:
- nvd@nist.gov (Primary)
- support@hackerone.com (Secondary)
References for CVE-2020-8131
-
https://hackerone.com/reports/730239
#730239 Filesystem Writes via `yarn install` via symlinks and tar transforms inside a crafted malicious packageExploit;Third Party Advisory
-
https://github.com/yarnpkg/yarn/pull/7831
Fixes arbitrary file write on fetch by arcanis · Pull Request #7831 · yarnpkg/yarn · GitHubPatch;Third Party Advisory
Jump to