This repository has been archived by the owner on Apr 25, 2023. It is now read-only.
CVE-2021-23438 (High) detected in mpath-0.8.3.tgz #16
Labels
security vulnerability
Security vulnerability detected by WhiteSource
CVE-2021-23438 - High Severity Vulnerability
Vulnerable Library - mpath-0.8.3.tgz
{G,S}et object values using MongoDB-like path notation
Library home page: https://registry.npmjs.org/mpath/-/mpath-0.8.3.tgz
Path to dependency file: ayoba/package.json
Path to vulnerable library: ayoba/node_modules/mpath/package.json
Dependency Hierarchy:
Found in base branch: dev
Vulnerability Details
This affects the package mpath before 0.8.4. A type confusion vulnerability can lead to a bypass of CVE-2018-16490. In particular, the condition ignoreProperties.indexOf(parts[i]) !== -1 returns -1 if parts[i] is ['proto']. This is because the method that has been called if the input is an array is Array.prototype.indexOf() and not String.prototype.indexOf(). They behave differently depending on the type of the input.
Publish Date: 2021-09-01
URL: CVE-2021-23438
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23438
Release Date: 2021-09-01
Fix Resolution: mpath - 0.8.4
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: