Prototype pollution vulnerability via .parse() in Plist before v3.0.4 allows attackers to cause a Denial of Service (DoS) and may lead to remote code execution.
References
Link | Resource |
---|---|
https://github.com/TooTallNate/plist.js/issues/114 | Exploit Issue Tracking Patch Third Party Advisory |
Configurations
Information
Published : 2022-02-17 11:15
Updated : 2022-07-14 10:02
NVD link : CVE-2022-22912
Mitre link : CVE-2022-22912
JSON object : View
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Products Affected
plist_project
- plist