-
Notifications
You must be signed in to change notification settings - Fork 585
Expand file tree
/
Copy pathGHSA-f6v4-cf5j-vf3w.json
More file actions
65 lines (65 loc) · 1.68 KB
/
GHSA-f6v4-cf5j-vf3w.json
File metadata and controls
65 lines (65 loc) · 1.68 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
{
"schema_version": "1.4.0",
"id": "GHSA-f6v4-cf5j-vf3w",
"modified": "2024-09-11T23:11:36Z",
"published": "2024-09-11T06:30:39Z",
"aliases": [
"CVE-2024-21529"
],
"summary": "dset Prototype Pollution vulnerability",
"details": "Versions of the package dset before 3.1.4 are vulnerable to Prototype Pollution via the dset function due improper user input sanitization. This vulnerability allows the attacker to inject malicious object property using the built-in Object property __proto__, which is recursively assigned to all the objects in the program.",
"severity": [
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N"
}
],
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "dset"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "1.0.0"
},
{
"fixed": "3.1.4"
}
]
}
]
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21529"
},
{
"type": "WEB",
"url": "https://github.com/lukeed/dset/commit/16d6154e085bef01e99f01330e5a421a7f098afa"
},
{
"type": "PACKAGE",
"url": "https://github.com/lukeed/dset"
},
{
"type": "WEB",
"url": "https://security.snyk.io/vuln/SNYK-JS-DSET-7116691"
}
],
"database_specific": {
"cwe_ids": [
"CWE-1321"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2024-09-11T23:11:10Z",
"nvd_published_at": "2024-09-11T05:15:02Z"
}
}