First published: Thu Nov 12 2020(Updated: )
Prototype pollution vulnerability in 'field' versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution.
Credit: vulnerabilitylab@mend.io vulnerabilitylab@mend.io
Affected Software | Affected Version | How to fix |
---|---|---|
Exodus Field | >=0.0.1<=1.0.1 |
https://github.com/jprichardson/field/blob/2a3811dfc4cdd13833977477d2533534fc61ce06/lib/field.js#L39
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28269 is a prototype pollution vulnerability in the 'field' package versions 0.0.1 through 1.0.1, allowing an attacker to cause a denial of service and potentially execute remote code.
The severity level of CVE-2020-28269 is critical, with a CVSS score of 9.8.
CVE-2020-28269 affects 'field' versions 0.0.1 through 1.0.1, exposing a vulnerability to prototype pollution.
CVE-2020-28269 can be exploited by an attacker to cause a denial of service and potentially execute remote code.
Yes, it is recommended to update to a fixed version of the 'field' package, which is available after version 1.0.1.