Description
In Node.js mixme, prior to v0.5.1, an attacker can add or alter properties of an object via '__proto__' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).
Remediation
References
http://nodejs.com
https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028
https://github.com/adaltas/node-mixme/issues/1
https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4
https://security.netapp.com/advisory/ntap-20210618-0005/
https://www.npmjs.com/~david
Related Vulnerabilities
CVE-2022-36908 Vulnerability in maven package org.jenkins-ci.plugins:openshift-deployer
CVE-2020-7691 Vulnerability in maven package org.webjars.bowergithub.mrrio:jspdf
CVE-2020-11007 Vulnerability in maven package com.shopizer:sm-core-model
CVE-2023-22579 Vulnerability in npm package @sequelize/core
CVE-2017-5878 Vulnerability in maven package org.red5:red5-server