This affects the package set-value
. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.
github.com/jonschlinkert/set-value
github.com/jonschlinkert/set-value/commit/09c4b108fea3c0260008590053ff13da64913245
github.com/jonschlinkert/set-value/commit/7cf8073bb06bf0c15e08475f9f952823b4576452
github.com/jonschlinkert/set-value/commit/cb12f14955dde6e61829d70d1851bfea6a3c31ad
github.com/jonschlinkert/set-value/pull/33
github.com/jonschlinkert/set-value/pull/33/commits/383b72d47c74a55ae8b6e231da548f9280a4296a
nvd.nist.gov/vuln/detail/CVE-2021-23440
snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212
snyk.io/vuln/SNYK-JS-SETVALUE-1540541
www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2
www.oracle.com/security-alerts/cpujan2022.html