Описание
Prototype Pollution in dojo
All versions of package dojo are vulnerable to Prototype Pollution via the setObject function.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2021-23450
- https://github.com/dojo/dojo/blob/4c39c14349408fc8274e19b399ffc660512ed07c/_base/lang.js%23L172
- https://lists.debian.org/debian-lts-announce/2023/01/msg00030.html
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2313036
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2313035
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBDOJO-2313034
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2313033
- https://snyk.io/vuln/SNYK-JS-DOJO-1535223
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Пакеты
Наименование
dojo
npm
Затронутые версииВерсия исправления
<= 1.16.4
Отсутствует
Связанные уязвимости
CVSS3: 7.5
ubuntu
около 4 лет назад
All versions of package dojo are vulnerable to Prototype Pollution via the setObject function.
CVSS3: 7.5
redhat
около 4 лет назад
All versions of package dojo are vulnerable to Prototype Pollution via the setObject function.
CVSS3: 7.5
nvd
около 4 лет назад
All versions of package dojo are vulnerable to Prototype Pollution via the setObject function.
CVSS3: 7.5
debian
около 4 лет назад
All versions of package dojo are vulnerable to Prototype Pollution via ...
CVSS3: 9.8
fstec
около 4 лет назад
Уязвимость функции setObject библиотеки dojo, позволяющая нарушителю выполнить произвольный код