CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
81.5%
A vulnerability was found in LinkedIn dustjs prior to version 3.0.0 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes (‘prototype pollution’). The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.0 can address this issue. The name of the patch is ddb6523832465d38c9d80189e9de60519ac307c3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216464.
github.com/advisories/GHSA-c6rp-wrp9-qr4q
github.com/linkedin/dustjs/commit/ddb6523832465d38c9d80189e9de60519ac307c3
github.com/linkedin/dustjs/issues/804
github.com/linkedin/dustjs/pull/805
github.com/linkedin/dustjs/releases/tag/v3.0.0
nvd.nist.gov/vuln/detail/CVE-2021-4264
vuldb.com/?ctiid.216464
vuldb.com/?id.216464