Description
This affects the package set-value before <2.0.1, >=3.0.0 <4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1976 | This affects the package set-value before <2.0.1, >=3.0.0 <4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays. |
Github GHSA |
GHSA-4jqc-8m5r-9rpr | Prototype Pollution in set-value |
References
History
Sun, 08 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat acm
|
|
| CPEs | cpe:/a:redhat:acm:2.2::el7 | |
| Vendors & Products |
Redhat acm
|
Mon, 19 Aug 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Vendors & Products |
Redhat acm
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-16T19:20:29.828Z
Reserved: 2021-01-08T00:00:00.000Z
Link: CVE-2021-23440
No data.
Status : Modified
Published: 2021-09-12T13:15:07.383
Modified: 2024-11-21T05:51:45.840
Link: CVE-2021-23440
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA