CVE-2023-46308

In Plotly plotly.js before 2.25.2, plot API calls have a risk of __proto__ being polluted in expandObjectPaths or nestedProperty.
Configurations

Configuration 1 (hide)

cpe:2.3:a:plotly:plotly.js:*:*:*:*:*:*:*:*

History

09 Jan 2024, 17:47

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Plotly plotly.js
Plotly
References () https://github.com/plotly/plotly.js/releases/tag/v2.25.2 - () https://github.com/plotly/plotly.js/releases/tag/v2.25.2 - Release Notes
References () https://plotly.com/javascript/ - () https://plotly.com/javascript/ - Product
CWE CWE-1321
CPE cpe:2.3:a:plotly:plotly.js:*:*:*:*:*:*:*:*

03 Jan 2024, 13:48

Type Values Removed Values Added
Summary
  • (es) En Plotly plotly.js anterior a 2.25.2, las llamadas a la API de trazado tienen el riesgo de que __proto__ se contamine en expandObjectPaths o nestedProperty.

03 Jan 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-03 05:15

Updated : 2024-01-09 17:47


NVD link : CVE-2023-46308

Mitre link : CVE-2023-46308

CVE.ORG link : CVE-2023-46308


JSON object : View

Products Affected

plotly

  • plotly.js
CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')