ghsa-39wv-qjgj-4jxg
Vulnerability from github
Published
2022-02-25 00:00
Modified
2022-03-17 00:05
Severity ?
Details
Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "proto". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.
{ "affected": [], "aliases": [ "CVE-2022-21824" ], "database_specific": { "cwe_ids": [ "CWE-1321" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-02-24T19:15:00Z", "severity": "HIGH" }, "details": "Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js \u003e= 12.22.9, \u003e= 14.18.3, \u003e= 16.13.2, and \u003e= 17.3.1 use a null protoype for the object these properties are being assigned to.", "id": "GHSA-39wv-qjgj-4jxg", "modified": "2022-03-17T00:05:16Z", "published": "2022-02-25T00:00:57Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21824" }, { "type": "WEB", "url": "https://hackerone.com/reports/1431042" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html" }, { "type": "WEB", "url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20220325-0007" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20220729-0004" }, { "type": "WEB", "url": "https://www.debian.org/security/2022/dsa-5170" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "type": "CVSS_V3" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.