Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWp4ZmgtOHdndi12ZnIy
Prototype pollution in dojo
In affected versions of dojo (NPM package), the deepCopy method is vulnerable to Prototype Pollution.
Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects.
An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values.
This has been patched in versions 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2
Permalink: https://github.com/advisories/GHSA-jxfh-8wgv-vfr2JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWp4ZmgtOHdndi12ZnIy
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 5 years ago
Updated: almost 2 years ago
CVSS Score: 7.7
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
EPSS Percentage: 0.00364
EPSS Percentile: 0.72038
Identifiers: GHSA-jxfh-8wgv-vfr2, CVE-2020-5258
References:
- https://github.com/dojo/dojo/security/advisories/GHSA-jxfh-8wgv-vfr2
- https://github.com/dojo/dojo/commit/20a00afb68f5587946dc76fbeaa68c39bda2171d
- https://nvd.nist.gov/vuln/detail/CVE-2020-5258
- https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://lists.apache.org/thread.html/rf481b3f25f05c52ba4e24991a941c1a6e88d281c6c9360a806554d00@%3Cusers.qpid.apache.org%3E
- https://lists.apache.org/thread.html/r3638722360d7ae95f874280518b8d987d799a76df7a9cd78eac33a1b@%3Cusers.qpid.apache.org%3E
- https://lists.apache.org/thread.html/r665fcc152bd0fec9f71511a6c2435ff24d3a71386b01b1a6df326fd3@%3Cusers.qpid.apache.org%3E
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://github.com/advisories/GHSA-jxfh-8wgv-vfr2
Blast Radius: 25.3
Affected Packages
npm:dojo
Dependent packages: 71Dependent repositories: 1,948
Downloads: 37,369 last month
Affected Version Ranges: >= 1.16.0, < 1.16.2, >= 1.15.0, < 1.15.3, >= 1.14.0, < 1.14.6, >= 1.13.0, < 1.13.7, >= 1.12.0, < 1.12.8, < 1.11.10
Fixed in: 1.16.2, 1.15.3, 1.14.6, 1.13.7, 1.12.8, 1.11.10
All affected versions: 1.6.4, 1.6.5, 1.7.11, 1.7.12, 1.8.13, 1.8.14, 1.9.1, 1.9.2, 1.9.3, 1.9.4, 1.9.5, 1.9.6, 1.9.7, 1.9.8, 1.9.9, 1.9.10, 1.9.11, 1.10.0, 1.10.1, 1.10.2, 1.10.3, 1.10.4, 1.10.5, 1.10.6, 1.10.7, 1.10.8, 1.10.9, 1.10.10, 1.11.0, 1.11.1, 1.11.2, 1.11.3, 1.11.4, 1.11.5, 1.11.6, 1.11.7, 1.11.8, 1.11.9, 1.12.1, 1.12.2, 1.12.3, 1.12.4, 1.12.5, 1.12.6, 1.12.7, 1.13.0, 1.13.1, 1.13.2, 1.13.3, 1.13.4, 1.13.5, 1.13.6, 1.14.0, 1.14.1, 1.14.2, 1.14.3, 1.14.4, 1.14.5, 1.15.0, 1.15.1, 1.15.2, 1.16.0, 1.16.1
All unaffected versions: 1.11.10, 1.11.11, 1.11.12, 1.11.13, 1.12.8, 1.12.9, 1.12.10, 1.12.11, 1.13.7, 1.13.8, 1.13.9, 1.13.10, 1.14.6, 1.14.7, 1.14.8, 1.14.9, 1.15.3, 1.15.4, 1.15.5, 1.15.6, 1.16.2, 1.16.3, 1.16.4, 1.16.5, 1.17.0, 1.17.1, 1.17.2, 1.17.3