Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-32866
HistoryApr 23, 2024 - 9:07 p.m.

CVE-2024-32866 Conform contains Prototype Pollution Vulnerability in `parseWith...` function

2024-04-2321:07:06
CWE-1321
GitHub_M
github.com
2
conform
prototype pollution
parsewith function
form validation
server-side
vulnerability
patch
version 1.1.1

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

AI Score

6.6

Confidence

High

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

Conform, a type-safe form validation library, allows the parsing of nested objects in the form of object.property. Due to an improper implementation of this feature in versions prior to 1.1.1, an attacker can exploit the feature to trigger prototype pollution by passing a crafted input to parseWith... functions. Applications that use conform for server-side validation of form data or URL parameters are affected by this vulnerability. Version 1.1.1 contains a patch for the issue.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:edmundhung:conform:*:*:*:*:*:*:*:*"
    ],
    "vendor": "edmundhung",
    "product": "conform",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

AI Score

6.6

Confidence

High

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-32866