The package madlib-object-utils before 0.1.8 are vulnerable to Prototype Pollution via the setValue method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix of [CVE-2020-7701](https://security.snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676)
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1800 | The package madlib-object-utils before 0.1.8 are vulnerable to Prototype Pollution via the setValue method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix of [CVE-2020-7701](https://security.snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676) |
Github GHSA |
GHSA-pfv6-prqm-85q8 | Prototype Pollution in madlib-object-utils |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-17T00:40:52.163Z
Reserved: 2022-02-24T00:00:00
Link: CVE-2022-24279
No data.
Status : Modified
Published: 2022-04-15T20:15:11.010
Modified: 2024-11-21T06:50:04.910
Link: CVE-2022-24279
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA