CVE-2019-19507 – jpv
Package
Manager: npm
Name: jpv
Vulnerable Version: >=0 <2.1.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00249 pctl0.48051
Details
Validation bypass is possible in Json Pattern Validator In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
Metadata
Created: 2019-12-04T21:25:28Z
Modified: 2021-08-19T16:05:30Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/12/GHSA-rh46-3fgc-mvrf/GHSA-rh46-3fgc-mvrf.json
CWE IDs: ["CWE-287"]
Alternative ID: GHSA-rh46-3fgc-mvrf
Finding: F006
Auto approve: 1