Описание
Prototype Pollution in mixin-deep
Versions of mixin-deep
prior to 2.0.1 or 1.3.2 are vulnerable to Prototype Pollution. The mixinDeep
function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects.
Recommendation
If you are using mixin-deep
2.x, upgrade to version 2.0.1 or later.
If you are using mixin-deep
1.x, upgrade to version 1.3.2 or later.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2019-10746
- https://github.com/jonschlinkert/mixin-deep/commit/8f464c8ce9761a8c9c2b3457eaeee9d404fa7af9
- https://github.com/jonschlinkert/mixin-deep/commit/90ee1fab375fccfd9b926df718243339b4976d50
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXRA365KZCUNXMU3KDH5JN5BEPNIGUKC
- https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212
- https://www.npmjs.com/advisories/1013
- https://www.oracle.com//security-alerts/cpujul2021.html
Пакеты
mixin-deep
< 1.3.2
1.3.2
mixin-deep
= 2.0.0
2.0.1
Связанные уязвимости
mixin-deep is vulnerable to Prototype Pollution in versions before 1.3.2 and version 2.0.0. The function mixin-deep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
mixin-deep is vulnerable to Prototype Pollution in versions before 1.3.2 and version 2.0.0. The function mixin-deep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
mixin-deep is vulnerable to Prototype Pollution in versions before 1.3.2 and version 2.0.0. The function mixin-deep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
mixin-deep is vulnerable to Prototype Pollution in versions before 1.3 ...