In Node.js mixme, prior to v0.5.1, an attacker can add or alter properties of an object via '__proto__' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).
                
            References
                    | Link | Resource | 
|---|---|
| http://nodejs.com | Third Party Advisory URL Repurposed | 
| https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028 | Patch Third Party Advisory | 
| https://github.com/adaltas/node-mixme/issues/1 | Issue Tracking Third Party Advisory | 
| https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4 | Patch Third Party Advisory | 
| https://security.netapp.com/advisory/ntap-20210618-0005/ | Third Party Advisory | 
| https://www.npmjs.com/~david | Third Party Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2021-05-03 12:15
Updated : 2024-02-14 01:17
NVD link : CVE-2021-28860
Mitre link : CVE-2021-28860
CVE.ORG link : CVE-2021-28860
JSON object : View
Products Affected
                adaltas
- mixme
 
CWE
                
                    
                        
                        CWE-1321
                        
            Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
