Skip to content

Prototype Pollution in upmerge

Moderate severity GitHub Reviewed Published Jun 6, 2019 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

npm upmerge (npm)

Affected versions

<= 0.1.8

Patched versions

None

Description

All versions of upmerge are vulnerable to Prototype Pollution. The merge() function fails to prevent user input to alter an Object's prototype, allowing attackers to modify override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leading to Remote Code Execution.

Recommendation

No fix is currently available. Consider using an alternative module until a fix is made available.

References

Reviewed Jun 6, 2019
Published to the GitHub Advisory Database Jun 6, 2019
Last updated Jan 9, 2023

Severity

Moderate

EPSS score

Weaknesses

Insufficient Verification of Data Authenticity

The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data. Learn more on MITRE.

Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. Learn more on MITRE.

CVE ID

No known CVE

GHSA ID

GHSA-gm9g-2g8v-fvxj

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.