First published: Sun Oct 03 2021(Updated: )
json-schema before version 0.4.0 is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution').
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-nodejs14-nodejs | <0:14.18.2-1.el7 | 0:14.18.2-1.el7 |
redhat/rh-nodejs14-nodejs-nodemon | <0:2.0.3-6.el7 | 0:2.0.3-6.el7 |
redhat/rh-nodejs12-nodejs | <0:12.22.12-2.el7 | 0:12.22.12-2.el7 |
Json-schema Project Json-schema | <0.4.0 | |
Debian Debian Linux | =10.0 | |
npm/json-schema | <0.4.0 | 0.4.0 |
redhat/nodejs-json-schema | <0.4.0 | 0.4.0 |
redhat/node | <16.11.0 | 16.11.0 |
redhat/npm | <8.1.0 | 8.1.0 |
<=10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID of this vulnerability is CVE-2021-3918.
The title of this vulnerability is 'json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ( Prototype Pollution ) vulnerability'.
The severity of CVE-2021-3918 is critical with a CVSS score of 9.8.
The affected software versions are nodejs-json-schema up to exclusive version 0.4.0, node up to exclusive version 16.11.0, and npm up to exclusive version 8.1.0.
An attacker can exploit CVE-2021-3918 by providing a specially crafted JSON file for validation, which can lead to arbitrary code execution.