Skip to content

Use of Potentially Dangerous Function in mixme

High
wdavidw published GHSA-79jw-6wg7-r9g4 May 5, 2021

Package

npm mixme (npm)

Affected versions

< 0.5.1

Patched versions

0.5.1

Description

Impact

In Node.js mixme v0.5.0, an attacker can add or alter properties of an object via 'proto' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).

Patches

The problem is corrected starting with version 0.5.1.

Workarounds

No

References

Issue: #1
Commit: cfd5fbf

For more information

If you have any questions or comments about this advisory:

Severity

High

CVE ID

CVE-2021-29491

Weaknesses

Credits