file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user's .bashrc file or replace /etc/shadow file if the GruntJS user is root.
We have discovered 1 live websites that are affected by CVE-2022-1537.
| Product | |
| Category | JavaScript Libraries |
| Vulnerable Domains | 1 live websites (100% of grunt install base) |
| Vulnerable Versions |
|
| Vulnerable Versions Count | 0 versions ( less than 0.1% of all versions) |
| 1 websites |
| .com | 1 websites |
| Domain | Country | Rank | Contacts |
|---|---|---|---|
| ************.com | ***,***,*** |
FAQ