CVE-2022-25645 – org.webjars.npm:dset
Package
Manager: maven
Name: org.webjars.npm:dset
Vulnerable Version: >=0 <3.1.2
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00661 pctl0.70261
Details
Prototype Pollution in dset All versions of `dset` prior to 3.1.2 are vulnerable to Prototype Pollution via `dset/merge` mode, as the `dset` function checks for prototype pollution by validating if the top-level path contains `__proto__`, `constructor` or `prototype`. By crafting a malicious object, it is possible to bypass this check and achieve prototype pollution.
Metadata
Created: 2022-05-03T00:00:45Z
Modified: 2022-05-20T20:13:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-23wx-cgxq-vpwx/GHSA-23wx-cgxq-vpwx.json
CWE IDs: ["CWE-1321"]
Alternative ID: GHSA-23wx-cgxq-vpwx
Finding: F390
Auto approve: 1