Lucene search

K
githubGitHub Advisory DatabaseGHSA-RC4V-99CR-PJCM
HistoryOct 17, 2023 - 2:21 p.m.

Prototype Pollution in ali-security/mongoose

2023-10-1714:21:16
CWE-1321
GitHub Advisory Database
github.com
14
vulnerability
prototype pollution
document.js
remote code execution
express
ejs
patch
mongoose 5.3.3
cve-2023-3696
@seal-security/mongoose-fixed
cve-2022-2564
cve-2019-17426
compatibility

Impact

This vulnerability causes a Prototype Pollution in document.js, through functions such as findByIdAndUpdate().
For applications using Express and EJS, this can potentially allow remote code execution.

Patches

The original patched version for mongoose 5.3.3 did not include a fix for CVE-2023-3696. Therefore the existing version @seal-security/mongoose-fixed version 5.3.3 is affected by this vulnerability (though it is protected from CVE-2022-2564 and CVE-2019-17426). To mitigate this issue, a @seal-security/mongoose-fixed version 5.3.4 has been deployed. Note that this version is compatible with the original mongoose version 5.3.3, not version 5.3.4

References

https://security.snyk.io/vuln/SNYK-JS-MONGOOSE-5777721
https://github.com/advisories/GHSA-9m93-w8w6-76hh
https://github.com/Automattic/mongoose/commit/f1efabf350522257364aa5c2cb36e441cf08f1a2

CPENameOperatorVersion
@seal-security/mongoose-fixedeq5.3.3