CVE-2022-42743

deep-parse-json version 1.0.2 allows an external attacker to edit or add new properties to an object. This is possible because the application does not correctly validate the incoming JSON keys, thus allowing the '__proto__' property to be edited.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:deep-parse-json_project:deep-parse-json:1.0.2:*:*:*:*:node.js:*:*

History

05 Nov 2022, 00:31

Type Values Removed Values Added
CPE cpe:2.3:a:deep-parse-json_project:deep-parse-json:1.0.2:*:*:*:*:node.js:*:*
CWE CWE-1321
First Time Deep-parse-json Project deep-parse-json
Deep-parse-json Project
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
References (MISC) https://github.com/sibu-github/deep-parse-json - (MISC) https://github.com/sibu-github/deep-parse-json - Product
References (MISC) https://fluidattacks.com/advisories/buuren/ - (MISC) https://fluidattacks.com/advisories/buuren/ - Exploit, Third Party Advisory

03 Nov 2022, 20:35

Type Values Removed Values Added
New CVE

Information

Published : 2022-11-03 20:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-42743

Mitre link : CVE-2022-42743

CVE.ORG link : CVE-2022-42743


JSON object : View

Products Affected

deep-parse-json_project

  • deep-parse-json
CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')