Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-23436

Опубликовано: 01 сент. 2021
Источник: nvd
CVSS3: 5.6
CVSS3: 9.8
CVSS2: 7.5
EPSS Низкий

Описание

This affects the package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition (p === "proto" || p === "constructor") in applyPatches_ returns false if p is ['proto'] (or ['constructor']). The === operator (strict equality operator) returns false if the operands have different type.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:immer_project:immer:*:*:*:*:*:node.js:*:*
Версия до 9.0.6 (исключая)

EPSS

Процентиль: 39%
0.00176
Низкий

5.6 Medium

CVSS3

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-843

Связанные уязвимости

CVSS3: 9.8
redhat
больше 4 лет назад

This affects the package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition (p === "__proto__" || p === "constructor") in applyPatches_ returns false if p is ['__proto__'] (or ['constructor']). The === operator (strict equality operator) returns false if the operands have different type.

CVSS3: 9.8
github
больше 4 лет назад

Prototype Pollution in immer

EPSS

Процентиль: 39%
0.00176
Низкий

5.6 Medium

CVSS3

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-843