Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-23436

Опубликовано: 01 сент. 2021
Источник: redhat
CVSS3: 9.8

Описание

This affects the package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition (p === "proto" || p === "constructor") in applyPatches_ returns false if p is ['proto'] (or ['constructor']). The === operator (strict equality operator) returns false if the operands have different type.

A prototype pollution flaw was found in the Node.js immer module. By adding or modifying properties of Object.prototype using a proto or constructor payload, an attacker could execute arbitrary code on the system.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Advanced Cluster Management for Kubernetes 2immerNot affected
Red Hat Process Automation 7immerOut of support scope
RHPAM 7.13.1 asyncFixedRHSA-2022:681305.10.2022

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=2041833immer: type confusion vulnerability can lead to a bypass of CVE-2020-28477

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 5.6
nvd
больше 4 лет назад

This affects the package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition (p === "__proto__" || p === "constructor") in applyPatches_ returns false if p is ['__proto__'] (or ['constructor']). The === operator (strict equality operator) returns false if the operands have different type.

CVSS3: 9.8
github
больше 4 лет назад

Prototype Pollution in immer

9.8 Critical

CVSS3