cvelist/2020/7xxx/CVE-2020-7600.json

67 lines
2.2 KiB
JSON
Raw Normal View History

2020-01-21 23:01:08 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-7600",
2020-03-12 23:01:11 +00:00
"ASSIGNER": "report@snyk.io",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "querymen",
"version": {
"version_data": [
{
"version_value": "All versions prior to 2.1.4"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Prototype Pollution"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://github.com/diegohaz/querymen/commit/1987fefcb3b7508253a29502a008d5063a873cef",
"url": "https://github.com/diegohaz/querymen/commit/1987fefcb3b7508253a29502a008d5063a873cef"
},
{
"refsource": "MISC",
"name": "https://snyk.io/vuln/SNYK-JS-QUERYMEN-559867",
"url": "https://snyk.io/vuln/SNYK-JS-QUERYMEN-559867"
}
]
2020-01-21 23:01:08 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2020-03-12 23:01:11 +00:00
"value": "querymen prior to 2.1.4 allows modification of object properties. The parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. This could be abused for Prototype Pollution attacks."
2020-01-21 23:01:08 +00:00
}
]
}
}