Описание
This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| node-chart.js | fixed | 2.9.4+dfsg+~cs2.10.1-1 | package | |
| node-chart.js | ignored | buster | package |
Примечания
https://snyk.io/vuln/SNYK-JS-CHARTJS-1018716
https://github.com/chartjs/Chart.js/pull/7920
Связанные уязвимости
This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution.
This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution.
This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution.
Уязвимость компонента chart.js приложения для выявления, анализа и визуализация бизнес-рисков IBM Data Risk Manager, позволяющая нарушителю выполнить произвольный код