Description
This affects the package js-ini before 1.3.0. If an attacker submits a malicious INI file to an application that parses it with parse , they will pollute the prototype on the application. This can be exploited further depending on the context.
Remediation
References
https://github.com/Sdju/js-ini/commit/fa17efb7e3a7c9464508a254838d4c231784931e
https://security.snyk.io/vuln/SNYK-JS-JSINI-1048970
Related Vulnerabilities
CVE-2023-27563 Vulnerability in npm package n8n
CVE-2022-28220 Vulnerability in maven package org.apache.james.protocols:protocols-api
CVE-2022-0355 Vulnerability in npm package simple-get
CVE-2022-24847 Vulnerability in maven package org.geoserver.web:gs-web-sec-jdbc
CVE-2020-14061 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind