CVE-2021-23434Type Confusion in Project Object-path

Severity
8.6HIGHNVD
GHSA9.8OSV9.8
EPSS
0.4%
top 39.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 27
Latest updateMar 22

Description

This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operator returns always false when the type of the operands is different.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:HExploitability: 3.9 | Impact: 4.7

Affected Packages3 packages

debiandebian/node-object-path< node-object-path 0.11.7-1 (bookworm)

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

4
OSV
node-object-path vulnerabilities2023-03-22
OSV
Prototype Pollution in object-path2021-09-01
GHSA
Prototype Pollution in object-path2021-09-01
OSV
CVE-2021-23434: This affects the package object-path before 02021-08-27

📋Vendor Advisories

3
Ubuntu
object-path vulnerabilities2023-03-22
Red Hat
object-path: Type confusion vulnerability can lead to a bypass of CVE-2020-152562021-08-27
Debian
CVE-2021-23434: node-object-path - This affects the package object-path before 0.11.6. A type confusion vulnerabili...2021