In Node.js mixme, prior to v0.5.1, an attacker can add or alter properties of an object via '__proto__' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).
References
Link | Resource |
---|---|
https://github.com/adaltas/node-mixme/issues/1 | Issue Tracking Third Party Advisory |
https://www.npmjs.com/~david | Third Party Advisory |
https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028 | Patch Third Party Advisory |
http://nodejs.com | Third Party Advisory |
https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4 | Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210618-0005/ | Third Party Advisory |
Configurations
Information
Published : 2021-05-03 05:15
Updated : 2021-12-10 10:55
NVD link : CVE-2021-28860
Mitre link : CVE-2021-28860
JSON object : View
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Products Affected
adaltas
- mixme