logo

CVE-2021-43852 oro/platform

Package

Manager: composer
Name: oro/platform
Vulnerable Version: >=4.1.0 <4.1.14 || >=4.2.0 <4.2.8

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00626 pctl0.693

Details

Client-Side JavaScript Prototype Pollution in oro/platform ### Summary By sending a specially crafted request, an attacker could inject properties into existing JavaScript language construct prototypes, such as objects. Later this injection may lead to JS code execution by libraries that are vulnerable to Prototype Pollution. ### Workarounds Configure WAF to drop requests containing next strings: `__proto__` , `constructor[prototype]`, `constructor.prototype`

Metadata

Created: 2022-01-06T18:29:51Z
Modified: 2022-01-04T22:46:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-jx5q-g37m-h5hj/GHSA-jx5q-g37m-h5hj.json
CWE IDs: ["CWE-1321", "CWE-74"]
Alternative ID: GHSA-jx5q-g37m-h5hj
Finding: F390
Auto approve: 1