GHSA-v39p-96qg-c8rf

Suggest an improvement
Source
https://github.com/advisories/GHSA-v39p-96qg-c8rf
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/09/GHSA-v39p-96qg-c8rf/GHSA-v39p-96qg-c8rf.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-v39p-96qg-c8rf
Aliases
  • CVE-2021-23434
  • SNYK-JAVA-ORGWEBJARSNPM-1570423
  • SNYK-JS-OBJECTPATH-1569453
Published
2021-09-01T18:37:11Z
Modified
2023-11-01T05:28:56.298671Z
Severity
  • 5.6 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
Prototype Pollution in object-path
Details

This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operator returns always false when the type of the operands is different.

Database specific
{
    "nvd_published_at": "2021-08-27T17:15:00Z",
    "cwe_ids": [
        "CWE-1321",
        "CWE-843"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2021-08-30T18:16:08Z"
}
References

Affected packages

npm / object-path

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.11.6