CVE-2018-16492
UNKNOWN
Published 2019-02-01T18:00:00
Actions:
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2018-16492. We'll provide specific mitigation strategies based on your environment and risk profile.
No CVSS data available
Description
A prototype pollution vulnerability was found in module extend <2.0.2, ~<3.0.2 that allows an attacker to inject arbitrary properties onto Object.prototype.
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
Affected Products
Affected Versions:
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
Advisory Details
Versions of `extend` prior to 3.0.2 (for 3.x) and 2.0.2 (for 2.x) are vulnerable to Prototype Pollution. The `extend()` function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
If you're using `extend` 3.x upgrade to 3.0.2 or later.
If you're using `extend` 2.x upgrade to 2.0.2 or later.
Affected Packages
npm
extend
ECOSYSTEM:
≥3.0.0
<3.0.2
npm
extend
ECOSYSTEM:
≥0
<2.0.2
CVSS Scoring
CVSS Score
5.0
References
Advisory provided by GitHub Security Advisory Database. Published: February 7, 2019, Modified: August 31, 2020
References
Published: 2019-02-01T18:00:00
Last Modified: 2024-08-05T10:24:32.840Z
Copied to clipboard!