Headline
CVE-2021-23470: Prototype Pollution in putil-merge | CVE-2021-23470 | Snyk
This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property.
Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-PUTILMERGE-1317077
Attack Complexity
Low
Availability
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications
snyk-id
SNYK-JS-PUTILMERGE-2391487
published
3 Feb 2022
disclosed
2 Feb 2022
credit
Cristian-Alexandru Staicu, Abdullah Alhamdan
How to fix?
Overview
Details
Types of attacks
Affected environments
How to prevent
References