Description
The package jointjs before 3.3.0 are vulnerable to Prototype Pollution via util.setByPath (https://resources.jointjs.com/docs/jointjs/v3.2/joint.htmlutil.setByPath). The path used the access the object's key and set the value is not properly sanitized, leading to a Prototype Pollution.
Remediation
References
https://github.com/clientIO/joint/blob/master/src/util/util.mjs%23L150
https://github.com/clientIO/joint/pull/1406
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062037
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062036
https://snyk.io/vuln/SNYK-JS-JOINTJS-1024444
Related Vulnerabilities
CVE-2014-0363 Vulnerability in maven package org.igniterealtime.smack:smack-core
CVE-2019-20149 Vulnerability in maven package org.webjars.bowergithub.jonschlinkert:kind-of
CVE-2018-11798 Vulnerability in maven package org.webjars.bower:thrift
CVE-2022-23458 Vulnerability in maven package org.webjars.npm:tui-grid
CVE-2022-23619 Vulnerability in maven package org.xwiki.platform:xwiki-platform-web