CVE-2022-21213

This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn mixes objects into the target object, recursively mixing existing child objects as well. In both cases, the key used to access the target object recursively is not checked, leading to exploiting this vulnerability. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-7792](https://security.snyk.io/vuln/SNYK-JS-MOUT-1014544).
Configurations

Configuration 1 (hide)

cpe:2.3:a:moutjs:mout:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 06:44

Type Values Removed Values Added
References () https://github.com/mout/mout/blob/master/src/object/deepFillIn.js - Exploit, Third Party Advisory () https://github.com/mout/mout/blob/master/src/object/deepFillIn.js - Exploit, Third Party Advisory
References () https://github.com/mout/mout/blob/master/src/object/deepMixIn.js - Exploit, Third Party Advisory () https://github.com/mout/mout/blob/master/src/object/deepMixIn.js - Exploit, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2870623 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2870623 - Exploit, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2870622 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2870622 - Exploit, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JS-MOUT-2342654 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JS-MOUT-2342654 - Exploit, Third Party Advisory

Information

Published : 2022-06-17 20:15

Updated : 2024-11-21 06:44


NVD link : CVE-2022-21213

Mitre link : CVE-2022-21213

CVE.ORG link : CVE-2022-21213


JSON object : View

Products Affected

moutjs

  • mout
CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')