All versions of package dojo are vulnerable to Prototype Pollution via the setObject function.
References
Link | Resource |
---|---|
https://github.com/dojo/dojo/blob/4c39c14349408fc8274e19b399ffc660512ed07c/_base/lang.js%23L172 | Broken Link Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00030.html | Mailing List Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2313036 | Exploit Mitigation Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2313035 | Exploit Mitigation Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBDOJO-2313034 | Exploit Mitigation Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2313033 | Exploit Mitigation Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-DOJO-1535223 | Exploit Mitigation Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2021-12-17 20:15
Updated : 2024-02-28 18:48
NVD link : CVE-2021-23450
Mitre link : CVE-2021-23450
CVE.ORG link : CVE-2021-23450
JSON object : View
Products Affected
oracle
- weblogic_server
- communications_policy_management
- primavera_unifier
linuxfoundation
- dojo
debian
- debian_linux
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')