Lucene search

K
githubGitHub Advisory DatabaseGHSA-79JW-6WG7-R9G4
HistoryMay 06, 2021 - 3:45 p.m.

Use of Potentially Dangerous Function in mixme

2021-05-0615:45:39
CWE-913
GitHub Advisory Database
github.com
16
node.js
mixme
vulnerability
object
mutate
merge
denial of service
patch
version 0.5.1
github

EPSS

0.001

Percentile

35.0%

Impact

In Node.js mixme v0.5.0, an attacker can add or alter properties of an object via ‘proto’ through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).

Patches

The problem is corrected starting with version 0.5.1.

References

Issue: https://github.com/adaltas/node-mixme/issues/1
Commit: https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028

Affected configurations

Vulners
Node
mixmeRange<0.5.1
VendorProductVersionCPE
*mixme*cpe:2.3:a:*:mixme:*:*:*:*:*:*:*:*

EPSS

0.001

Percentile

35.0%

Related for GHSA-79JW-6WG7-R9G4