Description
All versions of package dset are vulnerable to Prototype Pollution via 'dset/merge' mode, as the dset function checks for prototype pollution by validating if the top-level path contains __proto__, constructor or protorype. By crafting a malicious object, it is possible to bypass this check and achieve prototype pollution.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1897 | All versions of package dset are vulnerable to Prototype Pollution via 'dset/merge' mode, as the dset function checks for prototype pollution by validating if the top-level path contains __proto__, constructor or protorype. By crafting a malicious object, it is possible to bypass this check and achieve prototype pollution. |
Github GHSA |
GHSA-23wx-cgxq-vpwx | Prototype Pollution in dset |
References
History
Sun, 08 Sep 2024 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat acm |
|
| CPEs | cpe:/a:redhat:acm:2.4::el8 | |
| Vendors & Products |
Redhat
Redhat acm |
Mon, 19 Aug 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Vendors & Products |
Redhat
Redhat acm |
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-17T03:28:40.013Z
Reserved: 2022-02-24T00:00:00.000Z
Link: CVE-2022-25645
No data.
Status : Modified
Published: 2022-05-01T16:15:08.547
Modified: 2024-11-21T06:52:30.007
Link: CVE-2022-25645
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA