Versions of the package web3-utils before 4.2.1 are vulnerable to Prototype Pollution via the utility functions format and mergeDeep, due to insecure recursive merge.
An attacker can manipulate an object's prototype, potentially leading to the alteration of the behavior of all objects inheriting from the affected prototype by passing specially crafted input to these functions.
An attacker can manipulate an object's prototype, potentially leading to the alteration of the behavior of all objects inheriting from the affected prototype by passing specially crafted input to these functions.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0786 | Versions of the package web3-utils before 4.2.1 are vulnerable to Prototype Pollution via the utility functions format and mergeDeep, due to insecure recursive merge. An attacker can manipulate an object's prototype, potentially leading to the alteration of the behavior of all objects inheriting from the affected prototype by passing specially crafted input to these functions. |
Github GHSA |
GHSA-2g4c-8fpm-c46v | web3-utils Prototype Pollution vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-08-23T19:10:40.905Z
Reserved: 2023-12-22T12:33:20.119Z
Link: CVE-2024-21505
Updated: 2024-08-01T22:20:40.897Z
Status : Awaiting Analysis
Published: 2024-03-25T05:15:50.663
Modified: 2024-11-21T08:54:34.517
Link: CVE-2024-21505
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA