Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x2w5-725j-gf2g

Опубликовано: 20 апр. 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.4

Описание

Prototype Pollution in convict

Impact

  • An attacker can inject attributes that are used in other components
  • An attacker can override existing attributes with ones that have incompatible type, which may lead to a crash.

The main use case of Convict is for handling server-side configurations written by the admins owning the servers, and not random users. So it's unlikely that an admin would deliberately sabotage their own server. Still a situation can happen where an admin not knowledgeable about JavaScript could be tricked by an attacker into writing the malicious JavaScript code into some config files.

Patches

The problem is patched in convict@6.2.3. Users should upgrade to convict@6.2.3.

Workarounds

No way for users to fix or remediate the vulnerability without upgrading

References

For more information

If you have any questions or comments about this advisory: add your question as a comment in #384

Пакеты

Наименование

convict

npm
Затронутые версииВерсия исправления

< 6.2.3

6.2.3

EPSS

Процентиль: 75%
0.00892
Низкий

8.4 High

CVSS3

Дефекты

CWE-1321

Связанные уязвимости

CVSS3: 9.8
redhat
почти 4 года назад

The package convict before 6.2.2 are vulnerable to Prototype Pollution via the convict function due to missing validation of parentKey. **Note:** This vulnerability derives from an incomplete fix of another [vulnerability](https://security.snyk.io/vuln/SNYK-JS-CONVICT-1062508)

CVSS3: 7.5
nvd
почти 4 года назад

The package convict before 6.2.2 are vulnerable to Prototype Pollution via the convict function due to missing validation of parentKey. **Note:** This vulnerability derives from an incomplete fix of another [vulnerability](https://security.snyk.io/vuln/SNYK-JS-CONVICT-1062508)

EPSS

Процентиль: 75%
0.00892
Низкий

8.4 High

CVSS3

Дефекты

CWE-1321