The package object-path-set before 1.0.2 are vulnerable to Prototype Pollution via the setPath method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-OBJECTPATHSET-607908
References
Link | Resource |
---|---|
https://snyk.io/vuln/SNYK-JS-OBJECTPATHSET-2388576 | Exploit Third Party Advisory |
https://github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761 | Patch Third Party Advisory |
https://github.com/skratchdot/object-path-set/blob/577f5299fed15bb9edd11c940ff3cf0b9f4748d5/index.js%23L8 | Broken Link |
https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/ | Third Party Advisory |
Configurations
Information
Published : 2022-02-04 12:15
Updated : 2022-02-09 09:39
NVD link : CVE-2021-23507
Mitre link : CVE-2021-23507
JSON object : View
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Products Affected
skratchdot
- object-path-set