logo

CVE-2023-0163 convict

Package

Manager: npm
Name: convict
Vulnerable Version: >=0 <6.2.4

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

EPSS: 0.00128 pctl0.32971

Details

convict vulnerable to Prototype Pollution ### Impact * An attacker can inject attributes that are used in other components * An attacker can override existing attributes with ones that have incompatible type, which may lead to a crash. The main use case of Convict is for handling server-side configurations written by the admins owning the servers, and not random users. So it's unlikely that an admin would deliberately sabotage their own server. Still a situation can happen where an admin not knowledgeable about JavaScript could be tricked by an attacker into writing the malicious JavaScript code into some config files. ### Patches The problem is patched in `convict@6.2.4`. Users should upgrade to `convict@6.2.4`. ### Workarounds No way for users to fix or remediate the vulnerability without upgrading ### References https://github.com/mozilla/node-convict/issues/410

Metadata

Created: 2023-01-10T21:50:00Z
Modified: 2024-11-26T18:58:52Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-4jrm-c32x-w4jf/GHSA-4jrm-c32x-w4jf.json
CWE IDs: ["CWE-1321"]
Alternative ID: GHSA-4jrm-c32x-w4jf
Finding: F390
Auto approve: 1