Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-23434

Опубликовано: 27 авг. 2021
Источник: redhat
CVSS3: 8.6
EPSS Низкий

Описание

This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === 'proto' returns false if currentPath is ['proto']. This is because the === operator returns always false when the type of the operands is different.

Prototype pollution has been discovered in object-path NodeJS library. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === 'proto' returns false if currentPath is ['proto']. This is because the === operator returns always false when the type of the operands is different.

Отчет

  • OpenShift Container Platform components Thanos and Prometheus shipped with versions before 4.8 had the affected object-path library. Those versions are out of the support scope for Moderate and Low impact vulnerabilities because they are already in the maintenance support phase, hence the affected components has been marked as ooss.
  • Because Service Telemetry Framework1.2 will be retiring soon and the flaw's impact is lower, no update will be provided at this time for STF1.2's service-telemetry-operator-container and smart-gateway-operator-container.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 1servicemesh-prometheusOut of support scope
OpenShift Service Mesh 2.0servicemesh-prometheusAffected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/application-ui-rhel8Affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/grc-ui-rhel8Affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/mcm-topology-api-rhel8Affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/search-api-rhel8Affected
Red Hat A-MQ Onlineio.enmasse-enmasseOut of support scope
Red Hat Decision Manager 7org.optaweb.employeerostering-optaweb-employee-rosteringNot affected
Red Hat Decision Manager 7org.optaweb.vehiclerouting-optaweb-vehicle-routingNot affected
Red Hat JBoss Data Grid 7org.infinispan-infinispan-management-consoleOut of support scope

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-843
https://bugzilla.redhat.com/show_bug.cgi?id=1999810object-path: Type confusion vulnerability can lead to a bypass of CVE-2020-15256

EPSS

Процентиль: 20%
0.00062
Низкий

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 5.6
ubuntu
больше 4 лет назад

This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operator returns always false when the type of the operands is different.

CVSS3: 5.6
nvd
больше 4 лет назад

This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operator returns always false when the type of the operands is different.

CVSS3: 5.6
debian
больше 4 лет назад

This affects the package object-path before 0.11.6. A type confusion v ...

CVSS3: 5.6
github
больше 4 лет назад

Prototype Pollution in object-path

CVSS3: 8.6
fstec
больше 4 лет назад

Уязвимость модуля Node Object-path, связанная с ошибками преобразования типов данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 20%
0.00062
Низкий

8.6 High

CVSS3