Vulnerability Name: | CVE-2022-21190 (CCN-226231) | ||||||||||||
Assigned: | 2022-04-24 | ||||||||||||
Published: | 2022-04-24 | ||||||||||||
Updated: | 2022-05-24 | ||||||||||||
Summary: | This affects the package convict before 6.2.3. This is a bypass of [CVE-2022-22143](https://security.snyk.io/vuln/SNYK-JS-CONVICT-2340604). The [fix](https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880) introduced, relies on the startsWith method and does not prevent the vulnerability: before splitting the path, it checks if it starts with __proto__ or this.constructor.prototype. To bypass this check it's possible to prepend the dangerous paths with any string value followed by a dot, like for example foo.__proto__ or foo.this.constructor.prototype. | ||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.8 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
6.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-1321 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-21190 Source: XF Type: UNKNOWN nodejs-convict-dos(226231) Source: CONFIRM Type: Exploit, Third Party Advisory N/A Source: CONFIRM Type: Broken Link, Patch, Third Party Advisory N/A Source: CONFIRM Type: Broken Link, Release Notes, Tool Signature N/A Source: CCN Type: Node.js convict GIT Repository More more complete fix for prototype pollution Source: CONFIRM Type: Patch, Tool Signature N/A Source: CCN Type: NPM Web site Node.js convict module Source: CCN Type: SNYK-JS-CONVICT-2774757 Prototype Pollution Source: CONFIRM Type: Exploit, Third Party Advisory N/A | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |