Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXYzOXAtOTZxZy1jOHJm
Prototype Pollution in object-path
This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__'
returns false if currentPath
is ['__proto__']
. This is because the ===
operator returns always false when the type of the operands is different.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXYzOXAtOTZxZy1jOHJm
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 8 months ago
CVSS Score: 5.6
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Identifiers: GHSA-v39p-96qg-c8rf, CVE-2021-23434
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-23434
- https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb
- https://github.com/mariocasciaro/object-path#0116
- https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453
- https://github.com/mariocasciaro/object-path%230116
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1570423
- https://lists.debian.org/debian-lts-announce/2023/01/msg00031.html
- https://github.com/advisories/GHSA-v39p-96qg-c8rf
Blast Radius: 33.5
Affected Packages
npm:object-path
Dependent packages: 1,645Dependent repositories: 950,121
Downloads: 8,195,551 last month
Affected Version Ranges: < 0.11.6
Fixed in: 0.11.6
All affected versions: 0.0.1, 0.1.0, 0.1.2, 0.1.3, 0.2.0, 0.2.1, 0.3.0, 0.4.0, 0.5.0, 0.5.1, 0.6.0, 0.7.0, 0.8.0, 0.8.1, 0.9.0, 0.9.1, 0.9.2, 0.10.0, 0.11.0, 0.11.1, 0.11.2, 0.11.3, 0.11.4, 0.11.5
All unaffected versions: 0.11.6, 0.11.7, 0.11.8