CVE-2024-32866

Conform, a type-safe form validation library, allows the parsing of nested objects in the form of `object.property`. Due to an improper implementation of this feature in versions prior to 1.1.1, an attacker can exploit the feature to trigger prototype pollution by passing a crafted input to `parseWith...` functions. Applications that use conform for server-side validation of form data or URL parameters are affected by this vulnerability. Version 1.1.1 contains a patch for the issue.
Configurations

No configuration.

History

No history.

Information

Published : 2024-04-23 21:15

Updated : 2024-04-24 13:39


NVD link : CVE-2024-32866

Mitre link : CVE-2024-32866

CVE.ORG link : CVE-2024-32866


JSON object : View

Products Affected

No product.

CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')