First published: Thu Jul 28 2022(Updated: )
Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment. Affected versions of this package are vulnerable to Prototype Pollution. The `Schema.path()` function is vulnerable to prototype pollution when setting the schema object. This vulnerability allows modification of the Object prototype and could be manipulated into a Denial of Service (DoS) attack.
Credit: security@huntr.dev security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
npm/mongoose | <5.13.15 | 5.13.15 |
npm/mongoose | >=6.0.0<6.4.6 | 6.4.6 |
Mongoose | <6.4.6 | |
Mongoose | <5.13.15 | |
Mongoose | >=6.0.0<6.4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2564 is classified as a moderate severity vulnerability affecting specific versions of Mongoose.
To fix CVE-2022-2564, upgrade to Mongoose version 6.4.6 or later, or downgrade to any version below 5.13.15.
Versions of Mongoose prior to 6.4.6 and between 5.13.15 and 6.0.0 are affected by CVE-2022-2564.
CVE-2022-2564 is related to Prototype Pollution in the Schema.path() function of Mongoose.
CVE-2022-2564 can potentially be exploited remotely, as it affects a widely used database modeling library.