Description
The package object-path-set before 1.0.2 are vulnerable to Prototype Pollution via the setPath method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-OBJECTPATHSET-607908
Remediation
References
https://github.com/skratchdot/object-path-set/blob/577f5299fed15bb9edd11c940ff3cf0b9f4748d5/index.js%23L8
https://github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761
https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/
https://snyk.io/vuln/SNYK-JS-OBJECTPATHSET-2388576
Related Vulnerabilities
CVE-2020-9548 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2020-7676 Vulnerability in maven package org.webjars.npm:angular
CVE-2007-5333 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2018-20676 Vulnerability in maven package org.webjars.bower:bootstrap
CVE-2022-1291 Vulnerability in maven package org.webjars.npm:tableexport.jquery.plugin