Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS0ybTUzLTgzZjMtNTYyas0m4w

Prototype pollution in min-dash < 3.8.1

Impact

The set method is vulnerable to prototype pollution with specially crafted inputs.

// insert the following into poc.js and run node poc,js (after installing the package)
 
let parser = require("min-dash");
parser.set({}, [["__proto__"], "polluted"], "success");
console.log(polluted);

Patches

min-dash>=3.8.1 fix the issue.

Workarounds

No workarounds exist for the issue.

References

Closed via https://github.com/bpmn-io/min-dash/pull/21.

Credits

Credits to Cristian-Alexandru STAICU who found the vulnerability and to Idan Digmi from the Snyk Security Team who reported the vulnerability to us, responsibly.

Permalink: https://github.com/advisories/GHSA-2m53-83f3-562j
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0ybTUzLTgzZjMtNTYyas0m4w
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 3 years ago
Updated: almost 2 years ago


Identifiers: GHSA-2m53-83f3-562j
References: Repository: https://github.com/bpmn-io/min-dash
Blast Radius: 0.0

Affected Packages

npm:min-dash
Dependent packages: 255
Dependent repositories: 839
Downloads: 590,888 last month
Affected Version Ranges: < 3.8.1
Fixed in: 3.8.1
All affected versions: 0.1.0, 1.0.0, 1.0.1, 1.0.2, 1.1.0, 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.3.0, 2.4.0, 3.0.0, 3.1.0, 3.2.0, 3.3.0, 3.4.0, 3.5.0, 3.5.1, 3.5.2, 3.6.0, 3.6.1, 3.7.0, 3.8.0
All unaffected versions: 3.8.1, 4.0.0, 4.1.0, 4.1.1, 4.2.0, 4.2.1, 4.2.2