CVE-2020-7792

This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:moutjs:mout:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 05:37

Type Values Removed Values Added
References () https://github.com/mout/mout/blob/master/src/object/deepFillIn.js - Exploit, Third Party Advisory () https://github.com/mout/mout/blob/master/src/object/deepFillIn.js - Exploit, Third Party Advisory
References () https://github.com/mout/mout/blob/master/src/object/deepMixIn.js - Exploit, Third Party Advisory () https://github.com/mout/mout/blob/master/src/object/deepMixIn.js - Exploit, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1050374 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1050374 - Exploit, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1050373 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1050373 - Exploit, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JS-MOUT-1014544 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JS-MOUT-1014544 - Exploit, Third Party Advisory

Information

Published : 2020-12-11 11:15

Updated : 2024-11-21 05:37


NVD link : CVE-2020-7792

Mitre link : CVE-2020-7792

CVE.ORG link : CVE-2020-7792


JSON object : View

Products Affected

moutjs

  • mout
CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')