CVE-2020-7788

This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ini_project:ini:*:*:*:*:*:node.js:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:37

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 7.3
References () https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1 - Patch, Third Party Advisory () https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html - Mailing List, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JS-INI-1048974 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JS-INI-1048974 - Exploit, Third Party Advisory

Information

Published : 2020-12-11 11:15

Updated : 2024-11-21 05:37


NVD link : CVE-2020-7788

Mitre link : CVE-2020-7788

CVE.ORG link : CVE-2020-7788


JSON object : View

Products Affected

debian

  • debian_linux

ini_project

  • ini
CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')