jrburke requirejs v2.3.6 was discovered to contain a prototype pollution via the function config. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.
References
Link | Resource |
---|---|
https://gist.github.com/mestrtee/9acae342285bd2998fa09ebcb1e6d30a | Exploit Third Party Advisory |
Configurations
History
09 Sep 2024, 14:30
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:requirejs:requirejs:*:*:*:*:*:*:*:* | |
References | () https://gist.github.com/mestrtee/9acae342285bd2998fa09ebcb1e6d30a - Exploit, Third Party Advisory | |
First Time |
Requirejs
Requirejs requirejs |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
03 Jul 2024, 02:05
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CWE | CWE-1321 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.4 |
01 Jul 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-01 13:15
Updated : 2024-09-09 14:30
NVD link : CVE-2024-38998
Mitre link : CVE-2024-38998
CVE.ORG link : CVE-2024-38998
JSON object : View
Products Affected
requirejs
- requirejs
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')