This affects the package fastify-multipart before 5.3.1. By providing a name=constructor property it is still possible to crash the application. **Note:** This is a bypass of CVE-2020-8136 (https://security.snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-1290382).
References
Link | Resource |
---|---|
https://github.com/fastify/fastify-multipart/commit/a70dc7059a794589bd4fe066453141fc609e6066 | Patch Third Party Advisory |
https://github.com/fastify/fastify-multipart/releases/tag/v5.3.1 | Release Notes Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-2395480 | Exploit Patch Third Party Advisory |
Configurations
Information
Published : 2022-02-11 09:15
Updated : 2022-07-12 10:42
NVD link : CVE-2021-23597
Mitre link : CVE-2021-23597
JSON object : View
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Products Affected
fastify
- fastify-multipart