Prototype Pollution in mixme
Critical severity
GitHub Reviewed
Published
Feb 10, 2022
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
May 3, 2021
Reviewed
May 19, 2021
Published to the GitHub Advisory Database
Feb 10, 2022
Last updated
Feb 1, 2023
Node.js mixme 0.5.0, an attacker can add or alter properties of an object via 'proto' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).
References