Description
In affected versions of dojox (NPM package), the jqMix method is vulnerable to Prototype Pollution. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values. This has been patched in versions 1.11.10, 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2
Remediation
References
https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da
https://github.com/dojo/dojox/security/advisories/GHSA-3hw5-q855-g6cw
https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html
Related Vulnerabilities
CVE-2022-41249 Vulnerability in maven package com.meowlomo.jenkins:scm-httpclient
CVE-2022-31170 Vulnerability in npm package @openzeppelin/contracts
CVE-2022-41936 Vulnerability in maven package org.xwiki.platform:xwiki-platform-rest-server
CVE-2022-25881 Vulnerability in maven package org.webjars.npm:http-cache-semantics
CVE-2018-12536 Vulnerability in maven package org.eclipse.jetty:jetty-util