First published: Wed Oct 12 2022(Updated: )
A prototype pollution vulnerability was found in the parseQuery function in parseQuery.js in the webpack loader-utils via the name variable in parseQuery.js. This flaw can lead to a denial of service or remote code execution.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
npm/loader-utils | <1.4.1 | 1.4.1 |
npm/loader-utils | >=2.0.0<2.0.3 | 2.0.3 |
redhat/loader-utils | <1.4.1 | 1.4.1 |
redhat/loader-utils | <2.0.3 | 2.0.3 |
Webpack | <1.4.1 | |
Webpack | >=2.0.0<2.0.3 | |
Debian GNU/Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-37601 is a prototype pollution vulnerability found in the parseQuery function in parseQuery.js in the webpack loader-utils.
CVE-2022-37601 can lead to a denial of service or remote code execution.
CVE-2022-37601 has a severity rating of critical with a score of 9.8.
Loader-utils versions up to 1.4.1 and 2.0.3 are affected by CVE-2022-37601.
To fix CVE-2022-37601, update loader-utils to version 1.4.1 or 2.0.3.