Description
Conform, a type-safe form validation library, allows the parsing of nested objects in the form of `object.property`. Due to an improper implementation of this feature in versions prior to 1.1.1, an attacker can exploit the feature to trigger prototype pollution by passing a crafted input to `parseWith...` functions. Applications that use conform for server-side validation of form data or URL parameters are affected by this vulnerability. Version 1.1.1 contains a patch for the issue.
Published: 2024-04-23
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-1112 Conform, a type-safe form validation library, allows the parsing of nested objects in the form of `object.property`. Due to an improper implementation of this feature in versions prior to 1.1.1, an attacker can exploit the feature to trigger prototype pollution by passing a crafted input to `parseWith...` functions. Applications that use conform for server-side validation of form data or URL parameters are affected by this vulnerability. Version 1.1.1 contains a patch for the issue.
Github GHSA Github GHSA GHSA-624g-8qjg-8qxf Conform contains a Prototype Pollution Vulnerability in `parseWith...` function
History

No history.

Subscriptions

Edmundhung Conform
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T02:20:35.639Z

Reserved: 2024-04-19T14:07:11.228Z

Link: CVE-2024-32866

cve-icon Vulnrichment

Updated: 2024-04-29T12:19:21.590Z

cve-icon NVD

Status : Deferred

Published: 2024-04-23T21:15:48.407

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-32866

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses