This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.
References
Link | Resource |
---|---|
https://snyk.io/vuln/SNYK-JS-INI-1048974 | Exploit Third Party Advisory |
https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html | Mailing List Third Party Advisory |
Information
Published : 2020-12-11 03:15
Updated : 2022-12-02 11:40
NVD link : CVE-2020-7788
Mitre link : CVE-2020-7788
JSON object : View
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Products Affected
debian
- debian_linux
ini_project
- ini