CVE Vulnerabilities

CVE-2020-7608

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Published: Mar 16, 2020 | Modified: Nov 21, 2024
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CVSS 2.x
4.6 MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
5.3 LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

yargs-parser could be tricked into adding or modifying properties of Object.prototype using a proto payload.

Weakness

The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.

Affected Software

NameVendorStart VersionEnd Version
Yargs-parserYargs*5.0.1 (excluding)
Yargs-parserYargs6.0.0 (including)13.1.2 (excluding)
Yargs-parserYargs14.0.0 (including)15.0.1 (excluding)
Yargs-parserYargs16.0.0 (including)18.1.1 (excluding)
Red Hat Enterprise Linux 8RedHatnodejs:12-8030020201124152102.229f0a1c*
Red Hat Enterprise Linux 8RedHatnodejs:10-8030020210118191659.229f0a1c*
Red Hat OpenShift Container Storage 4.7.0 on RHEL-8RedHatocs4/mcg-core-rhel8:5.7.0-60.2c1fdb0.5.7*
Red Hat Quay 3RedHatquay/quay-rhel8:v3.6.0-62*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-nodejs12-nodejs-0:12.19.1-2.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-nodejs10-nodejs-0:10.23.1-2.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSRedHatrh-nodejs12-nodejs-0:12.19.1-2.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSRedHatrh-nodejs10-nodejs-0:10.23.1-2.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSRedHatrh-nodejs12-nodejs-0:12.19.1-2.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSRedHatrh-nodejs10-nodejs-0:10.23.1-2.el7*
Node-yargs-parserUbuntubionic*
Node-yargs-parserUbuntueoan*
Node-yargs-parserUbuntuesm-apps/bionic*
Node-yargs-parserUbuntutrusty*
Node-yargs-parserUbuntuupstream*

Potential Mitigations

References