Description
This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn mixes objects into the target object, recursively mixing existing child objects as well. In both cases, the key used to access the target object recursively is not checked, leading to exploiting this vulnerability. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-7792](https://security.snyk.io/vuln/SNYK-JS-MOUT-1014544).
Remediation
References
https://github.com/mout/mout/blob/master/src/object/deepFillIn.js
https://github.com/mout/mout/blob/master/src/object/deepMixIn.js
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2870623
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2870622
https://snyk.io/vuln/SNYK-JS-MOUT-2342654
Related Vulnerabilities
CVE-2020-8137 Vulnerability in maven package org.webjars.npm:uppy
CVE-2020-26870 Vulnerability in maven package org.webjars.bower:dompurify
CVE-2022-28220 Vulnerability in maven package org.apache.james.protocols:protocols-netty
CVE-2017-16132 Vulnerability in npm package simple-npm-registry
CVE-2023-24621 Vulnerability in maven package com.esotericsoftware.yamlbeans:yamlbeans