CVE-2022-22143 – convict
Package
Manager: npm
Name: convict
Vulnerable Version: >=0 <6.2.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00846 pctl0.73979
Details
Prototype Pollution in convict ### Impact * An attacker can inject attributes that are used in other components * An attacker can override existing attributes with ones that have incompatible type, which may lead to a crash. The main use case of Convict is for handling server-side configurations written by the admins owning the servers, and not random users. So it's unlikely that an admin would deliberately sabotage their own server. Still a situation can happen where an admin not knowledgeable about JavaScript could be tricked by an attacker into writing the malicious JavaScript code into some config files. ### Patches The problem is patched in `convict@6.2.3`. Users should upgrade to `convict@6.2.3`. ### Workarounds No way for users to fix or remediate the vulnerability without upgrading ### References * https://www.huntr.dev/bounties/1-npm-convict/ * #384 * 3b86be087d8f14681a9c889d45da7fe3ad9cd880 * 1ea0ab19c5208f66509e1c43b0d0f21c1fd29b75 ### For more information If you have any questions or comments about this advisory: add your question as a comment in #384
Metadata
Created: 2022-04-20T16:21:03Z
Modified: 2022-05-26T19:43:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/04/GHSA-x2w5-725j-gf2g/GHSA-x2w5-725j-gf2g.json
CWE IDs: ["CWE-1321"]
Alternative ID: GHSA-x2w5-725j-gf2g
Finding: F390
Auto approve: 1