Description
This affects the package js-ini before 1.3.0. If an attacker submits a malicious INI file to an application that parses it with parse , they will pollute the prototype on the application. This can be exploited further depending on the context.
Remediation
References
https://github.com/Sdju/js-ini/commit/fa17efb7e3a7c9464508a254838d4c231784931e
https://security.snyk.io/vuln/SNYK-JS-JSINI-1048970
Related Vulnerabilities
CVE-2021-46320 Vulnerability in npm package @openzeppelin/contracts
CVE-2022-0722 Vulnerability in npm package parse-url
CVE-2018-12545 Vulnerability in maven package org.eclipse.jetty.http2:http2-common
CVE-2023-3691 Vulnerability in maven package org.webjars:layui
CVE-2021-21293 Vulnerability in maven package org.http4s:blaze-core_2.12