logo

CVE-2019-19507 jpv

Package

Manager: npm
Name: jpv
Vulnerable Version: >=0 <2.1.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00249 pctl0.48051

Details

Validation bypass is possible in Json Pattern Validator In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.

Metadata

Created: 2019-12-04T21:25:28Z
Modified: 2021-08-19T16:05:30Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/12/GHSA-rh46-3fgc-mvrf/GHSA-rh46-3fgc-mvrf.json
CWE IDs: ["CWE-287"]
Alternative ID: GHSA-rh46-3fgc-mvrf
Finding: F006
Auto approve: 1