mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 09:41:05 +00:00
24 lines
1.2 KiB
Markdown
24 lines
1.2 KiB
Markdown
![]() |
### [CVE-2021-23436](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23436)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
This affects the package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition (p === "__proto__" || p === "constructor") in applyPatches_ returns false if p is ['__proto__'] (or ['constructor']). The === operator (strict equality operator) returns false if the operands have different type.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579266
|
||
|
- https://snyk.io/vuln/SNYK-JS-IMMER-1540542
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/broxus/ever-wallet-browser-extension
|
||
|
- https://github.com/broxus/ever-wallet-browser-extension-old
|
||
|
- https://github.com/dellalibera/dellalibera
|
||
|
- https://github.com/grafana/plugin-validator
|
||
|
- https://github.com/khulnasoft/plugin-validator
|
||
|
|