logo

CVE-2021-23434 object-path

Package

Manager: npm
Name: object-path
Vulnerable Version: >=0 <0.11.6

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

EPSS: 0.0006 pctl0.19005

Details

Prototype Pollution in object-path This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition `currentPath === '__proto__'` returns false if `currentPath` is `['__proto__']`. This is because the `===` operator returns always false when the type of the operands is different.

Metadata

Created: 2021-09-01T18:37:11Z
Modified: 2023-09-08T21:25:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/09/GHSA-v39p-96qg-c8rf/GHSA-v39p-96qg-c8rf.json
CWE IDs: ["CWE-1321", "CWE-843"]
Alternative ID: GHSA-v39p-96qg-c8rf
Finding: F390
Auto approve: 1