This affects the package convict before 6.2.3. This is a bypass of [CVE-2022-22143](https://security.snyk.io/vuln/SNYK-JS-CONVICT-2340604). The [fix](https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880) introduced, relies on the startsWith method and does not prevent the vulnerability: before splitting the path, it checks if it starts with __proto__ or this.constructor.prototype. To bypass this check it's possible to prepend the dangerous paths with any string value followed by a dot, like for example foo.__proto__ or foo.this.constructor.prototype.
References
Link | Resource |
---|---|
https://gist.github.com/dellalibera/cebce20e51410acebff1f46afdc89808 | Exploit Third Party Advisory |
https://github.com/mozilla/node-convict/blob/3b86be087d8f14681a9c889d45da7fe3ad9cd880/packages/convict/src/main.js%23L571 | Broken Link Patch Third Party Advisory |
https://github.com/mozilla/node-convict/blob/master/CHANGELOG.md%23623---2022-05-07 | Broken Link Release Notes Tool Signature |
https://github.com/mozilla/node-convict/commit/1ea0ab19c5208f66509e1c43b0d0f21c1fd29b75 | Patch Tool Signature |
https://snyk.io/vuln/SNYK-JS-CONVICT-2774757 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: snyk
Published: 2022-05-13T00:00:00
Updated: 2022-05-13T20:00:38
Reserved: 2022-02-24T00:00:00
Link: CVE-2022-21190
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-05-13T20:15:08.013
Modified: 2022-05-24T14:11:33.373
Link: CVE-2022-21190
JSON object: View
Redhat Information
No data.
CWE