module
Nodejs js-yaml load() Code Execution
Disclosed | Created |
---|---|
2013-06-28 | 2018-05-30 |
Disclosed
2013-06-28
Created
2018-05-30
Description
This module can be used to abuse node.js applications that parse user-supplied YAML input
using the load() function from the 'js-yaml' package the unsafe !!js/function tag, allowing to specify a self-executing function which results
on execution of arbitrary javascript code.
using the load() function from the 'js-yaml' package the unsafe !!js/function tag, allowing to specify a self-executing function which results
on execution of arbitrary javascript code.
Authors
Neal Poole
joev joev@metasploit.com
joev joev@metasploit.com
Platform
NodeJS
Architectures
nodejs
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.