-
Notifications
You must be signed in to change notification settings - Fork 585
Expand file tree
/
Copy pathGHSA-8j4w-5fw4-rm27.json
More file actions
61 lines (61 loc) · 1.52 KB
/
GHSA-8j4w-5fw4-rm27.json
File metadata and controls
61 lines (61 loc) · 1.52 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
{
"schema_version": "1.4.0",
"id": "GHSA-8j4w-5fw4-rm27",
"modified": "2023-01-09T05:01:55Z",
"published": "2019-08-27T17:45:33Z",
"aliases": [
"CVE-2019-10750"
],
"summary": "Prototype Pollution in deeply",
"details": "Versions of `deeply` prior to 3.1.0 are vulnerable to Prototype Pollution. The package fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects.\n\n\n\n\n## Recommendation\n\nUpgrade to version 3.1.0 or later.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "deeply"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0.1.0"
},
{
"fixed": "3.1.0"
}
]
}
]
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10750"
},
{
"type": "WEB",
"url": "https://snyk.io/vuln/SNYK-JS-DEEPLY-451026"
},
{
"type": "WEB",
"url": "https://www.npmjs.com/advisories/1030"
}
],
"database_specific": {
"cwe_ids": [
"CWE-400"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2019-08-27T17:28:49Z",
"nvd_published_at": null
}
}