CVE-2021-23597

This affects the package fastify-multipart before 5.3.1. By providing a name=constructor property it is still possible to crash the application. **Note:** This is a bypass of CVE-2020-8136 (https://security.snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-1290382).
Configurations

Configuration 1 (hide)

cpe:2.3:a:fastify:fastify-multipart:*:*:*:*:*:fastify:*:*

History

21 Nov 2024, 05:51

Type Values Removed Values Added
References () https://github.com/fastify/fastify-multipart/commit/a70dc7059a794589bd4fe066453141fc609e6066 - Patch, Third Party Advisory () https://github.com/fastify/fastify-multipart/commit/a70dc7059a794589bd4fe066453141fc609e6066 - Patch, Third Party Advisory
References () https://github.com/fastify/fastify-multipart/releases/tag/v5.3.1 - Release Notes, Third Party Advisory () https://github.com/fastify/fastify-multipart/releases/tag/v5.3.1 - Release Notes, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-2395480 - Exploit, Patch, Third Party Advisory () https://snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-2395480 - Exploit, Patch, Third Party Advisory

Information

Published : 2022-02-11 17:15

Updated : 2024-11-21 05:51


NVD link : CVE-2021-23597

Mitre link : CVE-2021-23597

CVE.ORG link : CVE-2021-23597


JSON object : View

Products Affected

fastify

  • fastify-multipart
CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')