Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability in Mozilla Convict. This allows an attacker to inject attributes that are used in other components, or to override existing attributes with ones that have incompatible type, which may lead to a crash. The main use case of Convict is for handling server-side configurations written by the admins owning the servers, and not random users. So it's unlikely that an admin would deliberately sabotage their own server. Still, a situation can happen where an admin not knowledgeable about JavaScript could be tricked by an attacker into writing the malicious JavaScript code into some config files. This issue affects Convict: before 6.2.4.
History

Wed, 27 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla
Mozilla convict
CPEs cpe:2.3:a:mozilla:convict:-:*:*:*:*:node.js:*:*
Vendors & Products Mozilla
Mozilla convict
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 26 Nov 2024 11:45:00 +0000

Type Values Removed Values Added
Description Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability in Mozilla Convict. This allows an attacker to inject attributes that are used in other components, or to override existing attributes with ones that have incompatible type, which may lead to a crash. The main use case of Convict is for handling server-side configurations written by the admins owning the servers, and not random users. So it's unlikely that an admin would deliberately sabotage their own server. Still, a situation can happen where an admin not knowledgeable about JavaScript could be tricked by an attacker into writing the malicious JavaScript code into some config files. This issue affects Convict: before 6.2.4.
Title Prototype Pollution in convict
Weaknesses CWE-1321
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published: 2024-11-26T11:36:26.574Z

Updated: 2024-11-27T16:02:29.836Z

Reserved: 2023-01-10T18:24:38.341Z

Link: CVE-2023-0163

cve-icon Vulnrichment

Updated: 2024-11-27T16:02:22.541Z

cve-icon NVD

Status : Received

Published: 2024-11-26T12:15:17.390

Modified: 2024-11-27T16:15:06.757

Link: CVE-2023-0163

cve-icon Redhat

No data.