All versions of the package flatnest are vulnerable to Prototype Pollution via the nest() function in the flatnest/nest.js file.
References
Link | Resource |
---|---|
https://github.com/brycebaril/node-flatnest/blob/b7d97ec64a04632378db87fcf3577bd51ac3ee39/nest.js%23L43 | Broken Link |
https://github.com/brycebaril/node-flatnest/commit/27d569baf9d9d25677640edeaf2d13af165868d6 | |
https://github.com/brycebaril/node-flatnest/issues/4 | Exploit Issue Tracking |
https://security.snyk.io/vuln/SNYK-JS-FLATNEST-3185149 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-06-30 05:15
Updated : 2024-02-07 13:15
NVD link : CVE-2023-26135
Mitre link : CVE-2023-26135
CVE.ORG link : CVE-2023-26135
JSON object : View
Products Affected
flatnest_project
- flatnest
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')