First published: Mon Dec 30 2019(Updated: )
ctorName in index.js in kind-of v6.0.2 allows external user input to overwrite certain internal attributes via a conflicting name, as demonstrated by 'constructor': {'name':'Symbol'}. Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
npm/kind-of | >=6.0.0<6.0.3 | 6.0.3 |
IBM EWM | <=7.0.2 | |
IBM EWM | <=7.0.1 | |
IBM RTC | <=6.0.2 | |
IBM RTC | <=6.0.6.1 | |
IBM EWM | <=7.0 | |
IBM RTC | <=6.0.6 | |
IBM RELM | <=6.0.6.1 | |
IBM ENI | <=7.0.1 | |
IBM RELM | <=6.0.6 | |
IBM ENI | <=7.0 | |
IBM RELM | <=6.0.2 | |
IBM ENI | <=7.0.2 | |
IBM Engineering Requirements Quality Assistant On-Premises | <=All | |
Kind-of Project Kind-of | =6.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-20149.
The severity of CVE-2019-20149 is high (7.5).
IBM EWM versions up to 7.0.2, IBM EWM versions up to 7.0.1, IBM RTC versions up to 6.0.2, IBM RTC versions up to 6.0.6.1, IBM RTC versions up to 6.0.6, IBM RELM versions up to 6.0.6.1, IBM RELM versions up to 6.0.6, IBM ENI versions up to 7.0.1, IBM ENI versions up to 7.0.2, and IBM Engineering Requirements Quality Assistant On-Premises (all versions) are affected.
A remote attacker can exploit CVE-2019-20149 by sending a specially-crafted payload to overwrite the builtin attribute and manipulate the type detection.
Yes, you can find references for CVE-2019-20149 at the following links: [GitHub Issue](https://github.com/jonschlinkert/kind-of/issues/30), [GitHub Pull Request](https://github.com/jonschlinkert/kind-of/pull/31), and [IBM X-Force Exchange](https://exchange.xforce.ibmcloud.com/vulnerabilities/173669).