This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution.
References
Link | Resource |
---|---|
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCHARTJS-1019376 | Exploit Third Party Advisory |
https://github.com/chartjs/Chart.js/pull/7920 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-CHARTJS-1018716 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1019375 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019374 | Exploit Third Party Advisory |
Configurations
Information
Published : 2020-10-29 01:15
Updated : 2022-12-02 11:44
NVD link : CVE-2020-7746
Mitre link : CVE-2020-7746
JSON object : View
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Products Affected
chartjs
- chart.js