First published: Tue Nov 19 2019(Updated: )
AngularJS could allow a remote attacker to bypass security restrictions, caused by a prototype pollution flaw in the merge function. By sending a specially-crafted request using a constructor payload, a remote attacker could exploit this vulnerability to add or modify properties of Object.prototype.
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Angularjs Angular.js | <1.7.9 | |
OSIsoft Applications using PI Asset Framework (AF) Client versions prior to and including PI AF Client 2018 SP3 Patch 1, Version 2.10.7.283 | ||
OSIsoft Applications using PI Software Development Kit (SDK) versions prior to and including PI SDK 2018 SP1, Version 1.4.7.602 | ||
OSIsoft PI API for Windows Integrated Security versions prior to and including 2.0.2.5, | ||
OSIsoft PI API versions prior to and including 1.6.8.26 | ||
OSIsoft PI Buffer Subsystem versions prior to and including 4.8.0.18 | ||
OSIsoft PI Connector for BACnet, versions prior to and including 1.2.0.6 | ||
OSIsoft PI Connector for CygNet, versions prior to and including 1.4.0.17 | ||
OSIsoft PI Connector for DC Systems RTscada, versions prior to and including 1.2.0.42 | ||
OSIsoft PI Connector for Ethernet/IP, versions prior to and including 1.1.0.10 | ||
OSIsoft PI Connector for HART-IP, versions prior to and including 1.3.0.1 | ||
OSIsoft PI Connector for Ping, versions prior to and including 1.0.0.54 | ||
OSIsoft PI Connector for Wonderware Historian, versions prior to and including 1.5.0.88 | ||
OSIsoft PI Connector Relay, versions prior to and including 2.5.19.0 | ||
OSIsoft PI Data Archive versions prior to and including PI Data Archive 2018 SP3, Version 3.4.430.460 | ||
OSIsoft PI Data Collection Manager, versions prior to and including 2.5.19.0 | ||
OSIsoft PI Integrator for Business Analytics versions prior to and including 2018 R2 SP1, Version 2.2.0.183 | ||
OSIsoft PI Interface Configuration Utility (ICU) versions prior to and including 1.5.0.7 | ||
OSIsoft PI to OCS versions prior to and including 1.1.36.0 | ||
F5 BIG-IP | >=17.1.0<=17.1.1 | |
F5 BIG-IP | >=16.1.0<=16.1.5 | |
F5 BIG-IP | >=15.1.0<=15.1.10 | |
IBM Cloud Pak for Business Automation | <=V22.0.2 - V22.0.2-IF004 | |
IBM Cloud Pak for Business Automation | <=V21.0.3 - V21.0.3-IF020 | |
IBM Cloud Pak for Business Automation | <=V22.0.1 - V22.0.1-IF006 and later fixesV21.0.2 - V21.0.2-IF012 and later fixesV21.0.1 - V21.0.1-IF007 and later fixesV20.0.1 - V20.0.3 and later fixesV19.0.1 - V19.0.3 and later fixesV18.0.0 - V18.0.2 and later fixes |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security flaw in AngularJS is CVE-2019-10768.
CVE-2019-10768 has a severity rating of 7.5 (High).
This vulnerability in AngularJS allows a remote attacker to bypass security restrictions and modify properties of Object.prototype.
IBM Cloud Pak for Business Automation versions V22.0.2 - V22.0.2-IF004 and V21.0.3 - V21.0.3-IF020 are affected by this vulnerability.
The vulnerability can be exploited by sending a specially-crafted request using a constructor payload.