All versions of package dset are vulnerable to Prototype Pollution via 'dset/merge' mode, as the dset function checks for prototype pollution by validating if the top-level path contains __proto__, constructor or protorype. By crafting a malicious object, it is possible to bypass this check and achieve prototype pollution.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: snyk

Published: 2022-05-01T00:00:00

Updated: 2023-09-12T07:06:07.655623

Reserved: 2022-02-24T00:00:00


Link: CVE-2022-25645

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2022-05-01T16:15:08.547

Modified: 2023-09-12T08:15:13.080


Link: CVE-2022-25645

JSON object: View

cve-icon Redhat Information

No data.

CWE