Mixme is a library for recursive merging of Javascript objects. In Node.js mixme v0.5.0, an attacker can add or alter properties of an object via 'proto' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS). The problem is corrected starting with version 0.5.1; no workarounds are known to exist.
References
| Link | Resource |
|---|---|
| https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4 | Patch Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20210622-0002/ | Third Party Advisory |
Configurations
Information
Published : 2021-05-06 13:15
Updated : 2021-12-03 19:47
NVD link : CVE-2021-29491
Mitre link : CVE-2021-29491
JSON object : View
Products Affected
mixme_project
- mixme
CWE
CWE-913
Improper Control of Dynamically-Managed Code Resources
