CVE-2021-23444

This affects the package jointjs before 3.4.2. A type confusion vulnerability can lead to a bypass of CVE-2020-28480 when the user-provided keys used in the path parameter are arrays in the setByPath function.
Configurations

Configuration 1 (hide)

cpe:2.3:a:client:jointjs:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 05:51

Type Values Removed Values Added
References () https://github.com/clientIO/joint/commit/e5bf89efef6d5ea572d66870ffd86560de7830a8 - Patch, Third Party Advisory () https://github.com/clientIO/joint/commit/e5bf89efef6d5ea572d66870ffd86560de7830a8 - Patch, Third Party Advisory
References () https://github.com/clientIO/joint/pull/1514 - Third Party Advisory () https://github.com/clientIO/joint/pull/1514 - Third Party Advisory
References () https://github.com/clientIO/joint/releases/tag/v3.4.2 - Release Notes, Third Party Advisory () https://github.com/clientIO/joint/releases/tag/v3.4.2 - Release Notes, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1655817 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1655817 - Exploit, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1655816 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1655816 - Exploit, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JS-JOINTJS-1579578 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JS-JOINTJS-1579578 - Exploit, Third Party Advisory
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 5.6

Information

Published : 2021-09-21 17:15

Updated : 2024-11-21 05:51


NVD link : CVE-2021-23444

Mitre link : CVE-2021-23444

CVE.ORG link : CVE-2021-23444


JSON object : View

Products Affected

client

  • jointjs
CWE
CWE-843

Access of Resource Using Incompatible Type ('Type Confusion')