This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
References
Link | Resource |
---|---|
https://github.com/TypedProject/tsed/blob/production/packages/core/src/utils/deepExtends.ts%23L36 | Broken Link Patch Third Party Advisory |
https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-TSEDCORE-1019382 | Exploit Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-10-20 11:15
Updated : 2022-12-02 19:45
NVD link : CVE-2020-7748
Mitre link : CVE-2020-7748
CVE.ORG link : CVE-2020-7748
JSON object : View
Products Affected
ts.ed_project
- ts.ed
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')