{
  "threat_severity" : "Important",
  "public_date" : "2019-12-16T00:00:00Z",
  "bugzilla" : {
    "description" : "nodejs-yarn: Install functionality can be abused to generate arbitrary symlinks",
    "id" : "1788328",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1788328"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-20",
  "details" : [ "In Yarn before 1.21.1, the package install functionality can be abused to generate arbitrary symlinks on the host filesystem by using specially crafted \"bin\" keys. Existing files could be overwritten depending on the current user permission set.", "A flaw was found in Yarn in versions prior to 1.21.1. Arbitrary symlinks can be generated using the package install functionality leading to existing files being overwritten. The highest threat from this vulnerability is to system confidentiality and integrity as well as system availability." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Quay 3",
    "release_date" : "2020-02-11T00:00:00Z",
    "advisory" : "RHSA-2020:0475",
    "cpe" : "cpe:/a:redhat:quay:3::el7",
    "package" : "quay3/clair-jwt:v3.2.1-1"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2019-10773\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-10773" ],
  "name" : "CVE-2019-10773",
  "csaw" : false
}