The package jointjs before 3.3.0 are vulnerable to Prototype Pollution via util.setByPath (https://resources.jointjs.com/docs/jointjs/v3.2/joint.htmlutil.setByPath). The path used the access the object's key and set the value is not properly sanitized, leading to a Prototype Pollution.
References
Link | Resource |
---|---|
https://github.com/clientIO/joint/pull/1406 | Third Party Advisory |
https://github.com/clientIO/joint/blob/master/src/util/util.mjs%23L150 | Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062037 | Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062036 | Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-JOINTJS-1024444 | Third Party Advisory |
Configurations
Information
Published : 2021-01-19 07:15
Updated : 2021-01-22 13:57
NVD link : CVE-2020-28480
Mitre link : CVE-2020-28480
JSON object : View
CWE
Products Affected
jointjs
- jointjs