CVE-2020-15256
Published: 19 October 2020
A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and setting the option `includeInheritedProps: true`, or by using the default `withInheritedProps` instance. The default operating mode is not affected by the vulnerability if version >= 0.11.0 is used. Any usage of `set()` in versions < 0.11.0 is vulnerable. The issue is fixed in object-path version 0.11.5 As a workaround, don't use the `includeInheritedProps: true` options or the `withInheritedProps` instance if using a version >= 0.11.0.
Priority
Status
Package | Release | Status |
---|---|---|
node-object-path Launchpad, Ubuntu, Debian |
bionic |
Released
(0.11.3-1ubuntu0.1)
|
focal |
Released
(0.11.4-2ubuntu0.1)
|
|
groovy |
Ignored
(reached end-of-life)
|
|
hirsute |
Not vulnerable
(0.11.5-3)
|
|
impish |
Not vulnerable
(0.11.5-3)
|
|
jammy |
Not vulnerable
(0.11.5-3)
|
|
kinetic |
Not vulnerable
(0.11.5-3)
|
|
lunar |
Not vulnerable
(0.11.5-3)
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15256
- https://github.com/mariocasciaro/object-path/security/advisories/GHSA-cwx2-736x-mf6w
- https://github.com/mariocasciaro/object-path/commit/2be3354c6c46215c7635eb1b76d80f1319403c68
- https://ubuntu.com/security/notices/USN-5967-1
- NVD
- Launchpad
- Debian