Описание
aurelia-path is part of the Aurelia platform and contains utilities for path manipulation. There is a prototype pollution vulnerability in aurelia-path before version 1.1.7. The vulnerability exposes Aurelia application that uses aurelia-path package to parse a string. The majority of this will be Aurelia applications that employ the aurelia-router package. An example is this could allow an attacker to change the prototype of base object class Object by tricking an application to parse the following URL: https://aurelia.io/blog/?__proto__[asdf]=asdf. The problem is patched in version 1.1.7.
Ссылки
- PatchThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
- Release NotesThird Party Advisory
- MitigationThird Party Advisory
- ProductThird Party Advisory
- PatchThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
- Release NotesThird Party Advisory
- MitigationThird Party Advisory
- ProductThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.1.7 (исключая)
cpe:2.3:a:bluespire:aurelia-path:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 92%
0.08513
Низкий
9.1 Critical
CVSS3
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-1321
CWE-1321
Связанные уязвимости
EPSS
Процентиль: 92%
0.08513
Низкий
9.1 Critical
CVSS3
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-1321
CWE-1321