This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution.
The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.
Link | Tags |
---|---|
https://snyk.io/vuln/SNYK-JS-CHARTJS-1018716 | third party advisory exploit |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019374 | third party advisory exploit |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1019375 | third party advisory exploit |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCHARTJS-1019376 | third party advisory exploit |
https://github.com/chartjs/Chart.js/pull/7920 | third party advisory patch |