deep-parse-json version 1.0.2 allows an external attacker to edit or add new properties to an object. This is possible because the application does not correctly validate the incoming JSON keys, thus allowing the '__proto__' property to be edited.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7326 | deep-parse-json version 1.0.2 allows an external attacker to edit or add new properties to an object. This is possible because the application does not correctly validate the incoming JSON keys, thus allowing the '__proto__' property to be edited. |
Github GHSA |
GHSA-ff9j-pwxg-q5p2 | deep-parse-json vulnerable to Prototype Pollution |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 05 May 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2025-05-05T13:05:32.905Z
Reserved: 2022-10-10T00:00:00.000Z
Link: CVE-2022-42743
Updated: 2024-08-03T13:10:41.454Z
Status : Modified
Published: 2022-11-03T20:15:32.137
Modified: 2025-05-05T14:15:25.657
Link: CVE-2022-42743
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA