Описание
A vulnerability has been found in Starcounter-Jack JSON-Patch up to 3.1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.1 is able to address this issue. The name of the patch is 7ad6af41eabb2d799f698740a91284d762c955c9. It is recommended to upgrade the affected component. VDB-216778 is the identifier assigned to this vulnerability.
Ссылки
- PatchThird Party Advisory
- ExploitPatchThird Party Advisory
- Release NotesThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- PatchThird Party Advisory
- ExploitPatchThird Party Advisory
- Release NotesThird Party Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.1.1 (исключая)
cpe:2.3:a:starcounter-jack:json-patch:*:*:*:*:*:*:*:*
EPSS
Процентиль: 70%
0.00643
Низкий
6.3 Medium
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-1321
Связанные уязвимости
CVSS3: 7.3
github
около 3 лет назад
Starcounter-Jack JSON-Patch Prototype Pollution vulnerability
EPSS
Процентиль: 70%
0.00643
Низкий
6.3 Medium
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-1321