cve/2022/CVE-2022-21213.md

20 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-21213](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21213)
![](https://img.shields.io/static/v1?label=Product&message=mout&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Prototype%20Pollution&color=brighgreen)
### Description
This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn mixes objects into the target object, recursively mixing existing child objects as well. In both cases, the key used to access the target object recursively is not checked, leading to exploiting this vulnerability. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-7792](https://security.snyk.io/vuln/SNYK-JS-MOUT-1014544).
### POC
#### Reference
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2870623
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2870622
- https://snyk.io/vuln/SNYK-JS-MOUT-2342654
#### Github
No PoCs found on GitHub currently.