Description
A vulnerability has been found in Starcounter-Jack JSON-Patch up to 3.1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.1 is able to address this issue. The name of the patch is 7ad6af41eabb2d799f698740a91284d762c955c9. It is recommended to upgrade the affected component. VDB-216778 is the identifier assigned to this vulnerability.
Remediation
References
https://github.com/Starcounter-Jack/JSON-Patch/commit/7ad6af41eabb2d799f698740a91284d762c955c9
https://github.com/Starcounter-Jack/JSON-Patch/pull/262
https://github.com/Starcounter-Jack/JSON-Patch/releases/tag/3.1.1
https://vuldb.com/?ctiid.216778
https://vuldb.com/?id.216778
Related Vulnerabilities
CVE-2020-36732 Vulnerability in maven package org.webjars.bower:crypto-js
CVE-2022-0624 Vulnerability in npm package parse-path
CVE-2020-28865 Vulnerability in maven package com.github.kfcfans:powerjob
CVE-2022-22965 Vulnerability in maven package org.springframework:spring-webmvc
CVE-2023-27095 Vulnerability in maven package cn.hippo4j:hippo4j-core