Description
This affects all versions of package ion-parser. If an attacker submits a malicious INI file to an application that parses it with parse , they will pollute the prototype on the application. This can be exploited further depending on the context.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6287 | This affects all versions of package ion-parser. If an attacker submits a malicious INI file to an application that parses it with parse , they will pollute the prototype on the application. This can be exploited further depending on the context. |
Github GHSA |
GHSA-7vrv-5m2h-rjw9 | ion-parser Prototype Pollution when malicious INI file submitted to application that parses with `parse` |
References
| Link | Providers |
|---|---|
| https://security.snyk.io/vuln/SNYK-JS-IONPARSER-1048971 |
|
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-16T16:44:05.253Z
Reserved: 2020-11-12T00:00:00.000Z
Link: CVE-2020-28462
No data.
Status : Modified
Published: 2022-07-25T14:15:09.877
Modified: 2024-11-21T05:22:51.030
Link: CVE-2020-28462
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA