CVE-2020-5259
Published: 10 March 2020
In affected versions of dojox (NPM package), the jqMix method is vulnerable to Prototype Pollution. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values. This has been patched in versions 1.11.10, 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2
Priority
Status
Package | Release | Status |
---|---|---|
dojo Launchpad, Ubuntu, Debian |
bionic |
Needs triage
|
eoan |
Ignored
(end of life)
|
|
focal |
Needs triage
|
|
groovy |
Not vulnerable
(1.15.3+dfsg1-1)
|
|
hirsute |
Not vulnerable
(1.15.3+dfsg1-1)
|
|
impish |
Not vulnerable
(1.15.3+dfsg1-1)
|
|
jammy |
Not vulnerable
(1.15.3+dfsg1-1)
|
|
kinetic |
Not vulnerable
(1.15.3+dfsg1-1)
|
|
lunar |
Not vulnerable
(1.15.3+dfsg1-1)
|
|
mantic |
Not vulnerable
(1.15.3+dfsg1-1)
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Needs triage
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.6 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Changed |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N |