7.5
CVSSv2

CVE-2022-21190

Published: 13/05/2022 Updated: 24/05/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

This affects the package convict prior to 6.2.3. This is a bypass of [CVE-2022-22143](security.snyk.io/vuln/SNYK-JS-CONVICT-2340604). The [fix](github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880) introduced, relies on the startsWith method and does not prevent the vulnerability: before splitting the path, it checks if it starts with __proto__ or this.constructor.prototype. To bypass this check it's possible to prepend the dangerous paths with any string value followed by a dot, like for example foo.__proto__ or foo.this.constructor.prototype.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla convict

Vendor Advisories

This affects the package convict before 623 This is a bypass of [CVE-2022-22143](securitysnykio/vuln/SNYK-JS-CONVICT-2340604) The [fix](githubcom/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880) introduced, relies on the startsWith method and does not prevent the vulnerability: before splitting the path, ...