#VU85028 Prototype pollution in merge


Published: 2024-01-05

Vulnerability identifier: #VU85028

Vulnerability risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-28499

CWE-ID: CWE-1321

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
merge
Other software / Other software solutions

Vendor: swordev

Description

The vulnerability allows a remote attacker to execute arbitrary JavaScript code.

The vulnerability exists due to improper input validation via _recursiveMerge. A remote attacker can pass specially crafted input to the application and perform prototype pollution, which can result in information disclosure or data manipulation.

Mitigation
Install update from vendor's website.

Vulnerable software versions

merge: 1.2.0 - 2.1.0


External links
http://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1071049
http://github.com/yeikos/js.merge/blob/master/src/index.ts%23L64
http://snyk.io/vuln/SNYK-JS-MERGE-1042987
http://vuldb.com/?id.170146


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability