Lucene search

K
githubGitHub Advisory DatabaseGHSA-7VRV-5M2H-RJW9
HistoryJul 26, 2022 - 12:01 a.m.

ion-parser Prototype Pollution when malicious INI file submitted to application that parses with `parse`

2022-07-2600:01:05
CWE-1321
GitHub Advisory Database
github.com
17
prototype pollution
malicious ini file
application parsing
context exploitation
ion-parser
software vulnerability

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

68.8%

This affects all versions of package ion-parser. If an attacker submits a malicious INI file to an application that parses it with parse , they will pollute the prototype on the application. This can be exploited further depending on the context.

Affected configurations

Vulners
Node
ion-parser_projection-parserRange0.5.2node.js
VendorProductVersionCPE
ion-parser_projection-parser*cpe:2.3:a:ion-parser_project:ion-parser:*:*:*:*:*:node.js:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

68.8%

Related for GHSA-7VRV-5M2H-RJW9