First published: Wed Jul 25 2018(Updated: )
Node.js extend module is vulnerable to a denial of service, caused by a prototype pollution flaw. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to inject properties onto Object.prototype to cause a denial of service condition.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Extend Project Extend | <2.0.2 | |
Extend Project Extend | >=3.0.0<3.0.2 | |
redhat/nodejs-extend | <2.0.2 | 2.0.2 |
redhat/nodesj-extend | <3.0.2 | 3.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16492 is a vulnerability in the Node.js extend module that allows an attacker to perform a denial-of-service attack by injecting properties onto Object.prototype.
CVE-2018-16492 has a severity rating of 9.8, which is classified as critical.
CVE-2018-16492 affects Node.js extend module versions 2.0.2 up to exclusive version 3.0.2.
An attacker can exploit CVE-2018-16492 by sending a specially-crafted request to the vulnerable server.
Yes, the fix for CVE-2018-16492 is to update the Node.js extend module to version 3.0.2 or higher.