Description
This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution.
Remediation
References
https://github.com/chartjs/Chart.js/pull/7920
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1019375
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCHARTJS-1019376
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019374
https://snyk.io/vuln/SNYK-JS-CHARTJS-1018716
Related Vulnerabilities
CVE-2020-28498 Vulnerability in maven package org.webjars.npm:elliptic
CVE-2019-20330 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2022-35961 Vulnerability in npm package @openzeppelin/contracts-upgradeable
CVE-2021-41183 Vulnerability in maven package org.webjars.bowergithub.jquery:jquery-ui
CVE-2023-40573 Vulnerability in maven package org.xwiki.platform:xwiki-platform-scheduler-api