This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
References
| Link | Resource |
|---|---|
| https://snyk.io/vuln/SNYK-JS-TSEDCORE-1019382 | Exploit Patch Third Party Advisory |
| https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b | Patch Third Party Advisory |
| https://github.com/TypedProject/tsed/blob/production/packages/core/src/utils/deepExtends.ts%23L36 | Patch Third Party Advisory |
Configurations
Information
Published : 2020-10-20 11:15
Updated : 2021-07-21 11:39
NVD link : CVE-2020-7748
Mitre link : CVE-2020-7748
JSON object : View
Products Affected
ts.ed_project
- ts.ed
CWE
CWE-400
Uncontrolled Resource Consumption
