Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS04N3FwLTdjdzgtOHE5Y84AA6QC
Duplicate Advisory: web3-utils Prototype Pollution vulnerability
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-2g4c-8fpm-c46v. This link is maintained to preserve external references.
Original Description
Versions of the package web3-utils before 4.2.1 are vulnerable to Prototype Pollution via the utility functions format and mergeDeep, due to insecure recursive merge.
An attacker can manipulate an object's prototype, potentially leading to the alteration of the behavior of all objects inheriting from the affected prototype by passing specially crafted input to these functions.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04N3FwLTdjdzgtOHE5Y84AA6QC
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 4 months ago
Updated: 4 months ago Widthdrawn: 4 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-87qp-7cw8-8q9c
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-21505
- https://github.com/web3/web3.js/commit/8ed041c6635d807b3da8960ad49e125e3d1b0e80
- https://security.snyk.io/vuln/SNYK-JS-WEB3UTILS-6229337
- https://github.com/advisories/GHSA-87qp-7cw8-8q9c
Blast Radius: 36.9
Affected Packages
npm:web3-utils
Dependent packages: 1,862Dependent repositories: 83,862
Downloads: 3,907,637 last month
Affected Version Ranges: < 4.2.1
Fixed in: 4.2.1
All affected versions: 0.0.1, 1.0.0, 1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.2.4, 1.2.5, 1.2.6, 1.2.7, 1.2.8, 1.2.9, 1.2.10, 1.2.11, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4, 1.3.5, 1.3.6, 1.4.0, 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.6.0, 1.6.1, 1.7.0, 1.7.1, 1.7.2, 1.7.3, 1.7.4, 1.7.5, 1.8.0, 1.8.1, 1.8.2, 1.9.0, 1.10.0, 1.10.1, 1.10.2, 1.10.3, 1.10.4, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 4.1.0, 4.1.1, 4.2.0
All unaffected versions: 4.2.1, 4.2.2, 4.2.3, 4.3.0, 4.3.1