CVE-2022-21213: Prototype Pollution in mout
(updated )
This affects all versions of package mout. The deepFillIn function can be used to ‘fill missing properties recursively’, while the deepMixIn mixes objects into the target object, recursively mixing existing child objects as well. In both cases, the key used to access the target object recursively is not checked, leading to exploiting this vulnerability. Note: This vulnerability derives from an incomplete fix of CVE-2020-7792.
References
- github.com/advisories/GHSA-vvv8-xw5f-3f88
- github.com/mout/mout/blob/master/src/object/deepFillIn.js
- github.com/mout/mout/blob/master/src/object/deepMixIn.js
- nvd.nist.gov/vuln/detail/CVE-2022-21213
- snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2870623
- snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2870622
- snyk.io/vuln/SNYK-JS-MOUT-2342654
Detect and mitigate CVE-2022-21213 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →