First published: Sun Sep 12 2021(Updated: )
A type confusion vulnerability can lead to a bypass of <a href="https://access.redhat.com/security/cve/CVE-2019-10747">CVE-2019-10747</a> when the user-provided keys used in the path parameter are arrays. External Reference: <a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212</a>
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Set-value Project Set-value | <2.0.1 | |
Set-value Project Set-value | >=3.0.0<4.0.1 | |
Oracle Communications Cloud Native Core Policy | =1.14.0 | |
npm/set-value | >=3.0.0<3.0.3 | 3.0.3 |
npm/set-value | >=4.0.0<4.0.1 | 4.0.1 |
npm/set-value | <2.0.1 | 2.0.1 |
nuget/set-value-nuget | <2.0.0 | 2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23440 is a type confusion vulnerability in the set-value package before version 2.0.1 and between version 3.0.0 and 4.0.1.
CVE-2021-23440 can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.
CVE-2021-23440 has a severity rating of 9.8, which is considered critical.
The set-value package versions before 2.0.1 and between 3.0.0 and 4.0.1 are affected by CVE-2021-23440, as well as Oracle Communications Cloud Native Core Policy version 1.14.0.
To fix CVE-2021-23440, update the set-value package to version 4.0.1 or apply the necessary security patches provided by the software vendor.