This affects the package json-ptr before 3.0.0. A type confusion vulnerability can lead to a bypass of CVE-2020-7766 when the user-provided keys used in the pointer parameter are arrays.
The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
Link | Tags |
---|---|
https://snyk.io/vuln/SNYK-JS-JSONPTR-1577291 | patch mitigation exploit vdb entry third party advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1767165 | patch mitigation exploit vdb entry third party advisory |
https://github.com/flitbit/json-ptr/pull/42 | third party advisory patch |
https://github.com/flitbit/json-ptr/commit/5dc458fbad1c382a2e3ca6d62e66ede3d92849ca | third party advisory patch |
https://github.com/flitbit/json-ptr%23security-vulnerabilities-resolved | third party advisory broken link |