CVE-2021-23760

The package keyget from 0.0.0 are vulnerable to Prototype Pollution via the methods set, push, and at which could allow an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix to [CVE-2020-28272](https://security.snyk.io/vuln/SNYK-JS-KEYGET-1048048)
References
Link Resource
https://snyk.io/vuln/SNYK-JS-KEYGET-2342624 Exploit Third Party Advisory
https://snyk.io/vuln/SNYK-JS-KEYGET-2342624 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:keyget_project:keyget:-:*:*:*:*:node.js:*:*

History

21 Nov 2024, 05:51

Type Values Removed Values Added
References () https://snyk.io/vuln/SNYK-JS-KEYGET-2342624 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JS-KEYGET-2342624 - Exploit, Third Party Advisory
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 5.6

Information

Published : 2022-01-28 22:15

Updated : 2024-11-21 05:51


NVD link : CVE-2021-23760

Mitre link : CVE-2021-23760

CVE.ORG link : CVE-2021-23760


JSON object : View

Products Affected

keyget_project

  • keyget
CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')