Description
This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.
Remediation
References
https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1
https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html
https://snyk.io/vuln/SNYK-JS-INI-1048974
Related Vulnerabilities
CVE-2021-4279 Vulnerability in maven package org.webjars.bower:fast-json-patch
CVE-2020-28441 Vulnerability in npm package conf-cfg-ini
CVE-2023-45820 Vulnerability in npm package directus
CVE-2020-28052 Vulnerability in maven package org.bouncycastle:bcprov-ext-jdk15on
CVE-2021-23664 Vulnerability in npm package @isomorphic-git/cors-proxy