CVE-2021-41097

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-41097
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-41097.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-41097
Aliases
Related
Published
2021-09-27T18:15:08Z
Modified
2025-10-15T13:18:54.920410Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

aurelia-path is part of the Aurelia platform and contains utilities for path manipulation. There is a prototype pollution vulnerability in aurelia-path before version 1.1.7. The vulnerability exposes Aurelia application that uses aurelia-path package to parse a string. The majority of this will be Aurelia applications that employ the aurelia-router package. An example is this could allow an attacker to change the prototype of base object class Object by tricking an application to parse the following URL: https://aurelia.io/blog/?__proto__[asdf]=asdf. The problem is patched in version 1.1.7.

References

Affected packages

Git / github.com/aurelia/path

Affected ranges

Type
GIT
Repo
https://github.com/aurelia/path
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

0.*

0.0.1
0.1.0
0.10.0
0.11.0
0.2.0
0.2.1
0.2.2
0.3.0
0.4.0
0.4.1
0.4.2
0.4.3
0.4.4
0.4.5
0.4.6
0.5.0
0.6.0
0.6.1
0.7.0
0.8.0
0.8.1
0.9.0

1.*

1.0.0
1.0.0-beta.1
1.0.0-beta.1.1.0
1.0.0-beta.1.1.1
1.0.0-beta.1.2.0
1.0.0-beta.1.2.1
1.0.0-beta.1.2.2
1.0.0-beta.2.0.0
1.0.0-beta.2.0.1
1.0.0-rc.1.0.0
1.1.0
1.1.1
1.1.2
1.1.3
1.1.4
1.1.5