This affects the package js-ini before 1.3.0. If an attacker submits a malicious INI file to an application that parses it with parse , they will pollute the prototype on the application. This can be exploited further depending on the context.
The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.
Link | Tags |
---|---|
https://security.snyk.io/vuln/SNYK-JS-JSINI-1048970 | third party advisory exploit |
https://github.com/Sdju/js-ini/commit/fa17efb7e3a7c9464508a254838d4c231784931e | third party advisory patch |