For node.js applications that parse user-supplied YAML input using the load() function from the ‘js-yaml’ package versions below 2.0.5, specifying a self-executing function allows us to execute arbitrary javascript code. This Metasploit module demonstrates that behavior…. For node.js applications that parse user-supplied YAML input using the load() function from the ‘js-yaml’ package versions below 2.0.5, specifying a self-executing function allows us to execute arbitrary javascript code. This Metasploit module demonstrates that behavior.

Read more http://packetstormsecurity.com/files/123396/nodejs_js_yaml_load_code_exec.rb.txt