#VU20426 Prototype pollution in set-value - CVE-2019-10747
Published: August 28, 2019
set-value
Jon Schlinkert
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to the "set-value" function fails to validate which Object properties it updates. A remote attacker can modify the prototype of Object using any of the constructor, prototype and "_proto_ payloads", causing the addition or modification of an existing property on all objects, trigger resource exhaustion and perform a denial of service attack.