Prototype Pollution in async #334
Labels
Auto Create Issues
Label for Auto Created Issues
High
This label for Security Severity only
Security
Label for Security Issues
Milestone
Description
A vulnerability exists in Async through 3.2.1 for 3.x and through 2.6.3 for 2.x (fixed in 3.2.2 and 2.6.4), which could let a malicious user obtain privileges via the
mapValues()
method.Severity Check
Severity Number
7,8 / 10
CVSS base metrics
Attack vector
Local
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Weaknesses
CWE-1321
CVE ID
CVE-2021-43138
GHSA ID
GHSA-fwr7-v2mv-hh25
Source code
caolan/async
Information
Package
async (npm)
Affected versions
3.2.2
2.6.4
References
https://nvd.nist.gov/vuln/detail/CVE-2021-43138
caolan/async@e1ecdbf
https://github.com/caolan/async/blob/master/lib/internal/iterator.js
https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js
https://jsfiddle.net/oz5twjd9/
Fix prototype pollution vulnerability caolan/async#1828
caolan/async@8f7f903
https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264
caolan/async@v2.6.3...v2.6.4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK/
The text was updated successfully, but these errors were encountered: