Lucene search

K
githubGitHub Advisory DatabaseGHSA-G3VF-47FV-8F3C
HistoryAug 11, 2023 - 3:30 p.m.

MrSwitch hello.js vulnerable to prototype pollution

2023-08-1115:30:46
CWE-1321
GitHub Advisory Database
github.com
4
mrswitch
hello.js
prototype pollution
vulnerability
remote attackers
arbitrary code
hello.utils.extend
software

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

61.9%

A prototype pollution vulnerability in MrSwitch hello.js prior to version 1.18.8 allows remote attackers to execute arbitrary code via hello.utils.extend function.

Affected configurations

Vulners
Node
hellojsRange<1.18.8
CPENameOperatorVersion
hellojslt1.18.8

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

61.9%

Related for GHSA-G3VF-47FV-8F3C