83 lines
2.1 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-41713",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2022-11-03T20:15:31.713",
"lastModified": "2022-11-05T01:38:13.917",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "deep-object-diff version 1.1.0 allows an external attacker to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the '__proto__' property to be edited."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1321"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:deep-object-diff_project:deep-object-diff:1.1.0:*:*:*:*:node.js:*:*",
"matchCriteriaId": "D70C4D39-2C00-4D47-BE81-B5803A5A0084"
}
]
}
]
}
],
"references": [
{
"url": "https://fluidattacks.com/advisories/heldens/",
"source": "help@fluidattacks.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/mattphillips/deep-object-diff",
"source": "help@fluidattacks.com",
"tags": [
"Product"
]
}
]
}