Show plain JSON{"id": "CVE-2024-32866", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "security-advisories@github.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.6, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 4.7, "exploitabilityScore": 3.9}]}, "published": "2024-04-23T21:15:48.407", "references": [{"url": "https://github.com/edmundhung/conform/blob/59156d7115a7207fa3b6f8a70a4342a9b24c2501/packages/conform-dom/formdata.ts#L117", "source": "security-advisories@github.com"}, {"url": "https://github.com/edmundhung/conform/commit/4819d51b5a53fd5486fc85c17cdc148eb160e3de", "source": "security-advisories@github.com"}, {"url": "https://github.com/edmundhung/conform/security/advisories/GHSA-624g-8qjg-8qxf", "source": "security-advisories@github.com"}], "vulnStatus": "Awaiting Analysis", "weaknesses": [{"type": "Secondary", "source": "security-advisories@github.com", "description": [{"lang": "en", "value": "CWE-1321"}]}], "descriptions": [{"lang": "en", "value": "Conform, a type-safe form validation library, allows the parsing of nested objects in the form of `object.property`. Due to an improper implementation of this feature in versions prior to 1.1.1, an attacker can exploit the feature to trigger prototype pollution by passing a crafted input to `parseWith...` functions. Applications that use conform for server-side validation of form data or URL parameters are affected by this vulnerability. Version 1.1.1 contains a patch for the issue.\n"}, {"lang": "es", "value": "Conform, una librer\u00eda de validaci\u00f3n de formularios con seguridad de tipos, permite el an\u00e1lisis de objetos anidados en forma de `object.property`. Debido a una implementaci\u00f3n incorrecta de esta caracter\u00edstica en versiones anteriores a la 1.1.1, un atacante puede explotar la caracter\u00edstica para desencadenar la contaminaci\u00f3n del prototipo pasando una entrada manipulada a las funciones `parseWith...`. Esta vulnerabilidad afecta a las aplicaciones que utilizan conform para la validaci\u00f3n del lado del servidor de datos de formulario o par\u00e1metros de URL. La versi\u00f3n 1.1.1 contiene un parche para el problema."}], "lastModified": "2024-04-24T13:39:42.883", "sourceIdentifier": "security-advisories@github.com"}