Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qh73-qc3p-rjv2

Опубликовано: 11 фев. 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Uncaught Exception in fastify-multipart

Impact

This is a bypass of CVE-2020-8136 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8136). By providing a name=constructor property it is still possible to crash the application. The original fix only checks for the key __proto__ (https://github.com/fastify/fastify-multipart/pull/116).

All users are recommended to upgrade

Patches

v5.3.1 includes a patch

Workarounds

No workarounds are possible.

References

Read up https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

fastify-multipart

npm
Затронутые версииВерсия исправления

< 5.3.1

5.3.1

EPSS

Процентиль: 60%
0.00405
Низкий

7.5 High

CVSS3

Дефекты

CWE-400

Связанные уязвимости

CVSS3: 7.5
nvd
почти 4 года назад

This affects the package fastify-multipart before 5.3.1. By providing a name=constructor property it is still possible to crash the application. **Note:** This is a bypass of CVE-2020-8136 (https://security.snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-1290382).

EPSS

Процентиль: 60%
0.00405
Низкий

7.5 High

CVSS3

Дефекты

CWE-400