CVE-2019-19507

In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
References
Link Resource
https://github.com/manvel-khnkoyan/jpv/issues/6 Exploit Issue Tracking Third Party Advisory
https://www.npmjs.com/package/jpv Product
https://github.com/manvel-khnkoyan/jpv/issues/6 Exploit Issue Tracking Third Party Advisory
https://www.npmjs.com/package/jpv Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:json_pattern_validator_project:json_pattern_validator:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:34

Type Values Removed Values Added
References () https://github.com/manvel-khnkoyan/jpv/issues/6 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/manvel-khnkoyan/jpv/issues/6 - Exploit, Issue Tracking, Third Party Advisory
References () https://www.npmjs.com/package/jpv - Product () https://www.npmjs.com/package/jpv - Product

Information

Published : 2019-12-02 17:15

Updated : 2024-11-21 04:34


NVD link : CVE-2019-19507

Mitre link : CVE-2019-19507

CVE.ORG link : CVE-2019-19507


JSON object : View

Products Affected

json_pattern_validator_project

  • json_pattern_validator
CWE
CWE-287

Improper Authentication