This affects the package set-value before <2.0.1, >=3.0.0 <4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.
References
Configurations
History
21 Nov 2024, 05:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/jonschlinkert/set-value/commit/7cf8073bb06bf0c15e08475f9f952823b4576452 - Patch, Third Party Advisory | |
References | () https://github.com/jonschlinkert/set-value/pull/33 - Patch, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212 - Exploit, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541 - Exploit, Third Party Advisory | |
References | () https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/ - Exploit, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 7.3 |
Information
Published : 2021-09-12 13:15
Updated : 2024-11-21 05:51
NVD link : CVE-2021-23440
Mitre link : CVE-2021-23440
CVE.ORG link : CVE-2021-23440
JSON object : View
Products Affected
set-value_project
- set-value
oracle
- communications_cloud_native_core_policy
CWE
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')