logo

CVE-2021-4264 dustjs-linkedin

Package

Manager: npm
Name: dustjs-linkedin
Vulnerable Version: >=0 <3.0.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00171 pctl0.38784

Details

dustjs-linkedin vulnerable to Prototype Pollution A vulnerability was found in LinkedIn dustjs prior to version 3.0.0 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.0 can address this issue. The name of the patch is ddb6523832465d38c9d80189e9de60519ac307c3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216464.

Metadata

Created: 2022-12-21T21:30:15Z
Modified: 2022-12-29T01:06:38Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-c6rp-wrp9-qr4q/GHSA-c6rp-wrp9-qr4q.json
CWE IDs: ["CWE-1321", "CWE-74", "CWE-94"]
Alternative ID: GHSA-c6rp-wrp9-qr4q
Finding: F184
Auto approve: 1