All versions of package dojo are vulnerable to Prototype Pollution via the setObject function.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 05:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/dojo/dojo/blob/4c39c14349408fc8274e19b399ffc660512ed07c/_base/lang.js%23L172 - Broken Link, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/01/msg00030.html - Mailing List, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2313036 - Exploit, Mitigation, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2313035 - Exploit, Mitigation, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBDOJO-2313034 - Exploit, Mitigation, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2313033 - Exploit, Mitigation, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JS-DOJO-1535223 - Exploit, Mitigation, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2022.html - Patch, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 7.5 |
Information
Published : 2021-12-17 20:15
Updated : 2024-11-21 05:51
NVD link : CVE-2021-23450
Mitre link : CVE-2021-23450
CVE.ORG link : CVE-2021-23450
JSON object : View
Products Affected
debian
- debian_linux
linuxfoundation
- dojo
oracle
- weblogic_server
- communications_policy_management
- primavera_unifier
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')