Описание
The package madlib-object-utils before 0.1.8 are vulnerable to Prototype Pollution via the setValue method, as it allows an attacker to merge object prototypes into it. Note: This vulnerability derives from an incomplete fix of CVE-2020-7701
Ссылки
- PatchThird Party Advisory
- ExploitPatchThird Party Advisory
- PatchThird Party Advisory
- ExploitPatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.1.8 (исключая)
cpe:2.3:a:springtree:madlib-object-utils:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 66%
0.00523
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-1321
Связанные уязвимости
CVSS3: 7.5
ubuntu
почти 4 года назад
The package madlib-object-utils before 0.1.8 are vulnerable to Prototype Pollution via the setValue method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix of [CVE-2020-7701](https://security.snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676)
EPSS
Процентиль: 66%
0.00523
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-1321