NA

CVE-2023-0842

Published: 05/04/2023 Updated: 14/03/2024
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

xml2js version 0.4.23 allows an external malicious user to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the __proto__ property to be edited.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

xml2js project xml2js 0.4.23

Vendor Advisories

Debian Bug report logs - #1034148 node-xml2js: CVE-2023-0842 Package: src:node-xml2js; Maintainer for src:node-xml2js is Debian Javascript Maintainers <pkg-javascript-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 10 Apr 2023 12:18:01 UTC Severity: important Tags: sec ...
xml2js version 0423 allows an external attacker to edit or add new properties to an object This is possible because the application does not properly validate incoming JSON keys, thus allowing the __proto__ property to be edited ...