logo

CVE-2022-25871 querymen

Package

Manager: npm
Name: querymen
Vulnerable Version: >=0 <=2.1.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00283 pctl0.5132

Details

Prototype Pollution in querymen All versions of package querymen are vulnerable to Prototype Pollution if the parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. Note: This vulnerability derives from an incomplete fix of [CVE-2020-7600](https://security.snyk.io/vuln/SNYK-JS-QUERYMEN-559867).

Metadata

Created: 2022-06-18T00:00:19Z
Modified: 2022-06-20T22:27:37Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-p23c-p8w2-ww5v/GHSA-p23c-p8w2-ww5v.json
CWE IDs: ["CWE-1321"]
Alternative ID: GHSA-p23c-p8w2-ww5v
Finding: F390
Auto approve: 1