logo

CVE-2020-7600 querymen

Package

Manager: npm
Name: querymen
Vulnerable Version: >=0 <2.1.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00319 pctl0.54395

Details

Improperly Controlled Modification of Dynamically-Determined Object Attributes in querymen querymen prior to 2.1.4 allows modification of object properties. The parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. This could be abused for Prototype Pollution attacks.

Metadata

Created: 2021-05-07T16:16:43Z
Modified: 2021-07-28T18:46:07Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-2cf2-2383-h4jv/GHSA-2cf2-2383-h4jv.json
CWE IDs: ["CWE-1321", "CWE-915"]
Alternative ID: GHSA-2cf2-2383-h4jv
Finding: F390
Auto approve: 1