CVE-2021-23597 – fastify-multipart
Package
Manager: npm
Name: fastify-multipart
Vulnerable Version: >=0 <5.3.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00405 pctl0.60242
Details
Uncaught Exception in fastify-multipart ### Impact This is a bypass of CVE-2020-8136 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8136). By providing a `name=constructor` property it is still possible to crash the application. The original fix only checks for the key `__proto__` (https://github.com/fastify/fastify-multipart/pull/116). All users are recommended to upgrade ### Patches v5.3.1 includes a patch ### Workarounds No workarounds are possible. ### References Read up https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [https://github.com/fastify/fastify-multipart](https://github.com/fastify/fastify-multipart) * Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
Metadata
Created: 2022-02-11T18:57:53Z
Modified: 2022-02-23T22:11:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-qh73-qc3p-rjv2/GHSA-qh73-qc3p-rjv2.json
CWE IDs: ["CWE-400"]
Alternative ID: GHSA-qh73-qc3p-rjv2
Finding: F067
Auto approve: 1