GHSA-mwv9-gp5h-frr4
ADVISORY - githubSummary
In some circumstances, devalue.parse and devalue.unflatten could emit objects with __proto__ own properties. This in and of itself is not a security vulnerability (and is possible with, for example, JSON.parse as well), but it can result in prototype injection if downstream code handles it incorrectly:
const result = devalue.parse(/* input creating an object with a __proto__ property */);
const target = {};
Object.assign(target, result); // target's prototype is now polluted
Common Weakness Enumeration (CWE)
ADVISORY - github
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
GitHub
CREATED
UPDATED
ADVISORY IDGHSA-mwv9-gp5h-frr4
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)