CVE-2019-10750 – deeply
Package
Manager: npm
Name: deeply
Vulnerable Version: >=0 <3.1.0
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00433 pctl0.61951
Details
Prototype Pollution in deeply Versions of `deeply` prior to 1.0.1 are vulnerable to Prototype Pollution. The package fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects. ## Recommendation Upgrade to version 3.1.0 or later.
Metadata
Created: 2019-08-27T17:45:33Z
Modified: 2021-08-17T22:18:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/08/GHSA-8j4w-5fw4-rm27/GHSA-8j4w-5fw4-rm27.json
CWE IDs: ["CWE-400"]
Alternative ID: GHSA-8j4w-5fw4-rm27
Finding: F067
Auto approve: 1