CVE-2021-32736 – think-helper
Package
Manager: npm
Name: think-helper
Vulnerable Version: >=0 <1.1.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00212 pctl0.43777
Details
Prototype Pollution in think-helper ### Impact The software receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype. ### Patches `think-helper@1.1.3` patched it, anyone used `think-helper` should upgrade to `>=1.1.3` version. ### References https://cwe.mitre.org/data/definitions/1321.html ### For more information If you have any questions or comments about this advisory: * Open an issue in [thinkjs/thinkjs](https://github.com/thinkjs/thinkjs) * Email us at [i@imnerd.org](mailto:i@imnerd.org)
Metadata
Created: 2021-07-01T17:01:59Z
Modified: 2022-05-26T19:57:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/07/GHSA-vr5m-3h59-7jcp/GHSA-vr5m-3h59-7jcp.json
CWE IDs: ["CWE-1321", "CWE-915"]
Alternative ID: GHSA-vr5m-3h59-7jcp
Finding: F390
Auto approve: 1