| |
Vulnerability CVE-2021-29491
Published: 2021-05-06
Description: |
Mixme is a library for recursive merging of Javascript objects. In Node.js mixme v0.5.0, an attacker can add or alter properties of an object via 'proto' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS). The problem is corrected starting with version 0.5.1; no workarounds are known to exist. |
Type:
CWE-913
CVSS2 => (AV:N/AC:L/Au:S/C:N/I:P/A:P)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
5.5/10 |
4.9/10 |
8/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
Single time |
Confidentiality impact |
Integrity impact |
Availability impact |
None |
Partial |
Partial |
References: |
https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|