An issue was discovered in the BSON ObjectID (aka bson-objectid) package 1.3.0 for Node.js. ObjectID() allows an attacker to generate a malformed objectid by inserting an additional property to the user-input, because bson-objectid will return early if it detects _bsontype==ObjectID in the user-input object. As a result, objects in arbitrary forms can bypass formatting if they have a valid bsontype.
References
Link | Resource |
---|---|
https://github.com/williamkapke/bson-objectid/issues/30 | Exploit Third Party Advisory |
https://www.npmjs.com/package/bson-objectid | Product |
https://github.com/williamkapke/bson-objectid/issues/30 | Exploit Third Party Advisory |
https://www.npmjs.com/package/bson-objectid | Product |
Configurations
History
21 Nov 2024, 04:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/williamkapke/bson-objectid/issues/30 - Exploit, Third Party Advisory | |
References | () https://www.npmjs.com/package/bson-objectid - Product |
Information
Published : 2019-12-11 20:15
Updated : 2024-11-21 04:35
NVD link : CVE-2019-19729
Mitre link : CVE-2019-19729
CVE.ORG link : CVE-2019-19729
JSON object : View
Products Affected
bson-objectid_project
- bson-objectid
CWE
CWE-670
Always-Incorrect Control Flow Implementation