This affects the package jointjs before 3.4.2. A type confusion vulnerability can lead to a bypass of CVE-2020-28480 when the user-provided keys used in the path parameter are arrays in the setByPath function.
References
Configurations
History
21 Nov 2024, 05:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/clientIO/joint/commit/e5bf89efef6d5ea572d66870ffd86560de7830a8 - Patch, Third Party Advisory | |
References | () https://github.com/clientIO/joint/pull/1514 - Third Party Advisory | |
References | () https://github.com/clientIO/joint/releases/tag/v3.4.2 - Release Notes, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1655817 - Exploit, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1655816 - Exploit, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JS-JOINTJS-1579578 - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 5.6 |
Information
Published : 2021-09-21 17:15
Updated : 2024-11-21 05:51
NVD link : CVE-2021-23444
Mitre link : CVE-2021-23444
CVE.ORG link : CVE-2021-23444
JSON object : View
Products Affected
client
- jointjs
CWE
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')