cvelist/2020/7xxx/CVE-2020-7600.json
2020-03-12 23:01:11 +00:00

67 lines
2.2 KiB
JSON

{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-7600",
"ASSIGNER": "report@snyk.io",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "querymen",
"version": {
"version_data": [
{
"version_value": "All versions prior to 2.1.4"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Prototype Pollution"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://github.com/diegohaz/querymen/commit/1987fefcb3b7508253a29502a008d5063a873cef",
"url": "https://github.com/diegohaz/querymen/commit/1987fefcb3b7508253a29502a008d5063a873cef"
},
{
"refsource": "MISC",
"name": "https://snyk.io/vuln/SNYK-JS-QUERYMEN-559867",
"url": "https://snyk.io/vuln/SNYK-JS-QUERYMEN-559867"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "querymen prior to 2.1.4 allows modification of object properties. The parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. This could be abused for Prototype Pollution attacks."
}
]
}
}