Description
In affected versions of dojox (NPM package), the jqMix method is vulnerable to Prototype Pollution. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values. This has been patched in versions 1.11.10, 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2
Remediation
References
https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da
https://github.com/dojo/dojox/security/advisories/GHSA-3hw5-q855-g6cw
https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html
Related Vulnerabilities
CVE-2022-31129 Vulnerability in maven package org.webjars.bowergithub.moment:moment
CVE-2021-21266 Vulnerability in maven package org.openhab.addons.bundles:org.openhab.binding.gce
CVE-2021-24122 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2021-21122 Vulnerability in maven package org.webjars.npm:electron
CVE-2021-27515 Vulnerability in maven package org.webjars.bowergithub.unshiftio:url-parse