mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
72 lines
2.3 KiB
JSON
72 lines
2.3 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-0842",
|
|
"ASSIGNER": "help@fluidattacks.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "n/a",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "xml2js",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "0.4.23"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Prototype Pollution"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://fluidattacks.com/advisories/myers/",
|
|
"url": "https://fluidattacks.com/advisories/myers/"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/Leonidas-from-XIV/node-xml2js/",
|
|
"url": "https://github.com/Leonidas-from-XIV/node-xml2js/"
|
|
},
|
|
{
|
|
"refsource": "MLIST",
|
|
"name": "[debian-lts-announce] 20240314 [SECURITY] [DLA 3760-1] node-xml2js security update",
|
|
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00013.html"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "xml2js version 0.4.23 allows an external attacker to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the __proto__ property to be edited."
|
|
}
|
|
]
|
|
}
|
|
} |