Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
CVE–2021–3918
Vulnerability details
Description
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
NVD
GitHub
CVSS details - 9.8
References
NVD - CVE-2021-3918
json-schema is vulnerable to Prototype Pollution · CVE-2021-3918 · GitHub Advisory Database · GitHub
Don't allow proto property to be used for schema default/coerce, … · kriszyp/json-schema@22f1461 · GitHub
Prototype Pollution vulnerability found in json-schema
Create SECURITY.md · Issue #84 · kriszyp/json-schema · GitHub
GitHub - kriszyp/json-schema: JSON Schema specifications, reference schemas, and a CommonJS implementation
json-schema/validate.js at master · kriszyp/json-schema · GitHub
Protect against constructor modification, #84 · kriszyp/json-schema@b62f1da · GitHub
Use a little more robust method of checking instances · kriszyp/json-schema@f6f6a3b · GitHub
Related information
📌 Remember! Check the changes to ensure they don't introduce any breaking changes.
📚 Read more about the CVE