All versions of package dojo are vulnerable to Prototype Pollution via the setObject function.
References
Link | Resource |
---|---|
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2313033 | Exploit Mitigation Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBDOJO-2313034 | Exploit Mitigation Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2313035 | Exploit Mitigation Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2313036 | Exploit Mitigation Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-DOJO-1535223 | Exploit Mitigation Third Party Advisory |
https://github.com/dojo/dojo/blob/4c39c14349408fc8274e19b399ffc660512ed07c/_base/lang.js%23L172 | Broken Link Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00030.html | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2021-12-17 12:15
Updated : 2023-01-30 10:24
NVD link : CVE-2021-23450
Mitre link : CVE-2021-23450
JSON object : View
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Products Affected
oracle
- weblogic_server
- primavera_unifier
- communications_policy_management
debian
- debian_linux
linuxfoundation
- dojo