CVE-2021-23507: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
(updated )
The package object-path-set is vulnerable to Prototype Pollution via the setPath method, as it allows an attacker to merge object prototypes into it. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-OBJECTPATHSET-607908
References
- github.com/skratchdot/object-path-set/blob/577f5299fed15bb9edd11c940ff3cf0b9f4748d5/index.js%23L8
- github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761
- nvd.nist.gov/vuln/detail/CVE-2021-23507
- snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/
- snyk.io/vuln/SNYK-JS-OBJECTPATHSET-2388576
Detect and mitigate CVE-2021-23507 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →