GMS-2020-519: Prototype Pollution in smart-extend
(updated )
All versions of smart-extend
are vulnerable to Prototype Pollution. The deep()
function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects.
Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
References
Detect and mitigate GMS-2020-519 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →