Prototype Pollution in querymen - CVE-2020-7600
Published: March 19, 2020
Vulnerability identifier: #VU26232
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Green
CVE-ID: CVE-2020-7600
CWE-ID: CWE-400
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: diegohaz
Affected software:
querymen
querymen
Detailed vulnerability description
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to improper input validation in parameters of exported function "handler(type, name, fn)". A remote attacker can modificate the object properties.
How to mitigate CVE-2020-7600
Install update from vendor's website.