VYPR
Critical severityNVD Advisory· Published Jun 28, 2013· Updated Apr 29, 2026

CVE-2013-4660

CVE-2013-4660

Description

The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
js-yamlnpm
< 2.0.52.0.5

Affected products

20
  • Nodeca/Js Yaml20 versions
    cpe:2.3:a:nodeca:js-yaml:*:*:*:*:*:*:*:*+ 19 more
    • cpe:2.3:a:nodeca:js-yaml:*:*:*:*:*:*:*:*range: <=2.0.4
    • cpe:2.3:a:nodeca:js-yaml:0.2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:nodeca:js-yaml:0.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:nodeca:js-yaml:0.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:nodeca:js-yaml:0.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:nodeca:js-yaml:0.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:nodeca:js-yaml:0.3.2:*:*:*:*:*:*:*
    • cpe:2.3:a:nodeca:js-yaml:0.3.3:*:*:*:*:*:*:*
    • cpe:2.3:a:nodeca:js-yaml:0.3.4:*:*:*:*:*:*:*
    • cpe:2.3:a:nodeca:js-yaml:0.3.5:*:*:*:*:*:*:*
    • cpe:2.3:a:nodeca:js-yaml:0.3.6:*:*:*:*:*:*:*
    • cpe:2.3:a:nodeca:js-yaml:0.3.7:*:*:*:*:*:*:*
    • cpe:2.3:a:nodeca:js-yaml:1.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:nodeca:js-yaml:1.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:nodeca:js-yaml:1.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:nodeca:js-yaml:1.0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:nodeca:js-yaml:2.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:nodeca:js-yaml:2.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:nodeca:js-yaml:2.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:nodeca:js-yaml:2.0.3:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.