A prototype pollution vulnerability exists in the function copy in dom.js in the xmldom (published as @xmldom/xmldom) package before 0.8.3 for Node.js via the p variable. NOTE: the vendor states "we are in the process of marking this report as invalid"; however, some third parties takes the position that "A prototype injection/Prototype pollution is not just when global objects are polluted with recursive merge or deep cloning but also when a target object is polluted."
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3154-1 node-xmldom security update
EUVD EUVD EUVD-2022-7067 A prototype pollution vulnerability exists in the function copy in dom.js in the xmldom (published as @xmldom/xmldom) package before 0.8.3 for Node.js via the p variable. NOTE: the vendor states "we are in the process of marking this report as invalid"; however, some third parties takes the position that "A prototype injection/Prototype pollution is not just when global objects are polluted with recursive merge or deep cloning but also when a target object is polluted."
Github GHSA Github GHSA GHSA-9pgh-qqpf-7wqj Withdrawn: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in @xmldom/xmldom and xmldom
Ubuntu USN Ubuntu USN USN-6102-1 xmldom vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T10:29:21.029Z

Reserved: 2022-08-08T00:00:00

Link: CVE-2022-37616

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-10-11T05:15:10.747

Modified: 2024-11-21T07:15:03.297

Link: CVE-2022-37616

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.