Description
All versions of package dojo are vulnerable to Prototype Pollution via the setObject function.
Remediation
References
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2313033
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBDOJO-2313034
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2313035
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2313036
https://snyk.io/vuln/SNYK-JS-DOJO-1535223
https://github.com/dojo/dojo/blob/4c39c14349408fc8274e19b399ffc660512ed07c/_base/lang.js%23L172
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://lists.debian.org/debian-lts-announce/2023/01/msg00030.html
Related Vulnerabilities
CVE-2018-3767 Vulnerability in npm package memjs
CVE-2022-34113 Vulnerability in maven package io.dataease:dataease-plugin-common
CVE-2021-22134 Vulnerability in maven package org.elasticsearch:elasticsearch
CVE-2012-5784 Vulnerability in maven package org.apache.axis:axis
CVE-2020-14968 Vulnerability in maven package org.webjars.bower:jsrsasign