CVE-2019-19729

An issue was discovered in the BSON ObjectID (aka bson-objectid) package 1.3.0 for Node.js. ObjectID() allows an attacker to generate a malformed objectid by inserting an additional property to the user-input, because bson-objectid will return early if it detects _bsontype==ObjectID in the user-input object. As a result, objects in arbitrary forms can bypass formatting if they have a valid bsontype.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bson-objectid_project:bson-objectid:1.3.0:*:*:*:*:node.js:*:*

History

21 Nov 2024, 04:35

Type Values Removed Values Added
References () https://github.com/williamkapke/bson-objectid/issues/30 - Exploit, Third Party Advisory () https://github.com/williamkapke/bson-objectid/issues/30 - Exploit, Third Party Advisory
References () https://www.npmjs.com/package/bson-objectid - Product () https://www.npmjs.com/package/bson-objectid - Product

Information

Published : 2019-12-11 20:15

Updated : 2024-11-21 04:35


NVD link : CVE-2019-19729

Mitre link : CVE-2019-19729

CVE.ORG link : CVE-2019-19729


JSON object : View

Products Affected

bson-objectid_project

  • bson-objectid
CWE
CWE-670

Always-Incorrect Control Flow Implementation