CVE-2020-28495 – total.js
Package
Manager: npm
Name: total.js
Vulnerable Version: >=0 <3.4.7
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
EPSS: 0.06091 pctl0.90404
Details
Prototype pollution in total.js There is a prototype pollution vulnerability in the package total.js before version 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the application. In some cases it is possible to achieve Denial of service (DoS), Remote Code Execution or Property Injection.
Metadata
Created: 2021-02-05T20:43:19Z
Modified: 2023-09-13T20:22:24Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/02/GHSA-6cf8-qhqj-vjqm/GHSA-6cf8-qhqj-vjqm.json
CWE IDs: ["CWE-1321", "CWE-400"]
Alternative ID: GHSA-6cf8-qhqj-vjqm
Finding: F390
Auto approve: 1