Логотип exploitDog
bind:CVE-2022-46175
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-46175

Количество 7

Количество 7

ubuntu логотип

CVE-2022-46175

около 3 лет назад

JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including versions 1.0.1 and 2.2.1 does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, ...

CVSS3: 7.1
EPSS: Средний
redhat логотип

CVE-2022-46175

около 3 лет назад

JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including versions 1.0.1 and 2.2.1 does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, ...

CVSS3: 8.8
EPSS: Средний
nvd логотип

CVE-2022-46175

около 3 лет назад

JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including versions 1.0.1 and 2.2.1 does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, ele

CVSS3: 7.1
EPSS: Средний
msrc логотип

CVE-2022-46175

больше 1 года назад

CVSS3: 8.8
EPSS: Средний
debian логотип

CVE-2022-46175

около 3 лет назад

JSON5 is an extension to the popular JSON file format that aims to be ...

CVSS3: 7.1
EPSS: Средний
github логотип

GHSA-9c47-m6qq-7p4h

около 3 лет назад

Prototype Pollution in JSON5 via Parse Method

CVSS3: 7.1
EPSS: Средний
fstec логотип

BDU:2023-07864

около 3 лет назад

Уязвимость метода parse библиотеки json5 пакетного менеджера NPM, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-46175

JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including versions 1.0.1 and 2.2.1 does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, ...

CVSS3: 7.1
40%
Средний
около 3 лет назад
redhat логотип
CVE-2022-46175

JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including versions 1.0.1 and 2.2.1 does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, ...

CVSS3: 8.8
40%
Средний
около 3 лет назад
nvd логотип
CVE-2022-46175

JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including versions 1.0.1 and 2.2.1 does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, ele

CVSS3: 7.1
40%
Средний
около 3 лет назад
msrc логотип
CVSS3: 8.8
40%
Средний
больше 1 года назад
debian логотип
CVE-2022-46175

JSON5 is an extension to the popular JSON file format that aims to be ...

CVSS3: 7.1
40%
Средний
около 3 лет назад
github логотип
GHSA-9c47-m6qq-7p4h

Prototype Pollution in JSON5 via Parse Method

CVSS3: 7.1
40%
Средний
около 3 лет назад
fstec логотип
BDU:2023-07864

Уязвимость метода parse библиотеки json5 пакетного менеджера NPM, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.8
40%
Средний
около 3 лет назад

Уязвимостей на страницу