Vulnerability CVE-2020-28495


Published: 2021-02-02

Description:
This affects the package total.js before 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the application. In some cases it is possible to achieve Denial of service (DoS), Remote Code Execution or Property Injection.

Type:

NVD-CWE-Other

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Totaljs -> Total.js 

 References:
https://docs.totaljs.com/latest/en.html%23api~FrameworkUtils~U.set
https://github.com/totaljs/framework/blob/master/utils.js%23L6606
https://github.com/totaljs/framework/blob/master/utils.js%23L6617
https://github.com/totaljs/framework/commit/b3f901561d66ab799a4a99279893b94cad7ae4ff
https://snyk.io/vuln/SNYK-JS-TOTALJS-1046671

Copyright 2024, cxsecurity.com

 

Back to Top