cve/2021/CVE-2021-23470.md

18 lines
847 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-23470](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23470)
![](https://img.shields.io/static/v1?label=Product&message=putil-merge&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%203.8.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Prototype%20Pollution&color=brighgreen)
### Description
This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-PUTILMERGE-1317077
### POC
#### Reference
- https://snyk.io/vuln/SNYK-JS-PUTILMERGE-2391487
#### Github
No PoCs found on GitHub currently.