CVE-2021-23507

The package object-path-set before 1.0.2 are vulnerable to Prototype Pollution via the setPath method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-OBJECTPATHSET-607908
Configurations

Configuration 1 (hide)

cpe:2.3:a:skratchdot:object-path-set:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:51

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 7.5
References () https://github.com/skratchdot/object-path-set/blob/577f5299fed15bb9edd11c940ff3cf0b9f4748d5/index.js%23L8 - Broken Link () https://github.com/skratchdot/object-path-set/blob/577f5299fed15bb9edd11c940ff3cf0b9f4748d5/index.js%23L8 - Broken Link
References () https://github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761 - Patch, Third Party Advisory () https://github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761 - Patch, Third Party Advisory
References () https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/ - Third Party Advisory () https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/ - Third Party Advisory
References () https://snyk.io/vuln/SNYK-JS-OBJECTPATHSET-2388576 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JS-OBJECTPATHSET-2388576 - Exploit, Third Party Advisory

Information

Published : 2022-02-04 20:15

Updated : 2024-11-21 05:51


NVD link : CVE-2021-23507

Mitre link : CVE-2021-23507

CVE.ORG link : CVE-2021-23507


JSON object : View

Products Affected

skratchdot

  • object-path-set
CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')