Description
This affects the package conf-cfg-ini before 1.2.2. If an attacker submits a malicious INI file to an application that parses it with decode, they will pollute the prototype on the application. This can be exploited further depending on the context.
Remediation
References
https://github.com/loge5/conf-cfg-ini/commit/3a88a6c52c31eb6c0f033369eed40aa168a636ea
https://security.snyk.io/vuln/SNYK-JS-CONFCFGINI-1048973
Related Vulnerabilities
CVE-2023-37942 Vulnerability in maven package org.jenkins-ci.plugins:external-monitor-job
CVE-2022-25206 Vulnerability in maven package org.jenkins-ci.plugins:dbcharts
CVE-2018-1000192 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2019-10184 Vulnerability in maven package io.undertow:undertow-servlet
CVE-2023-40014 Vulnerability in maven package org.webjars.npm:openzeppelin__contracts