Prototype Pollution in putil-merge
High severity
GitHub Reviewed
Published
Feb 5, 2022
to the GitHub Advisory Database
•
Updated Feb 3, 2023
Description
Published by the National Vulnerability Database
Feb 4, 2022
Published to the GitHub Advisory Database
Feb 5, 2022
Reviewed
Feb 7, 2022
Last updated
Feb 3, 2023
This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-PUTILMERGE-1317077
References