CVE-2021-4264 – dustjs-linkedin
Package
Manager: npm
Name: dustjs-linkedin
Vulnerable Version: >=0 <3.0.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00171 pctl0.38784
Details
dustjs-linkedin vulnerable to Prototype Pollution A vulnerability was found in LinkedIn dustjs prior to version 3.0.0 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.0 can address this issue. The name of the patch is ddb6523832465d38c9d80189e9de60519ac307c3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216464.
Metadata
Created: 2022-12-21T21:30:15Z
Modified: 2022-12-29T01:06:38Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-c6rp-wrp9-qr4q/GHSA-c6rp-wrp9-qr4q.json
CWE IDs: ["CWE-1321", "CWE-74", "CWE-94"]
Alternative ID: GHSA-c6rp-wrp9-qr4q
Finding: F184
Auto approve: 1