Description
In Node.js mixme, prior to v0.5.1, an attacker can add or alter properties of an object via '__proto__' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).
References (6)
Core 6
Core References
Third Party Advisory, URL Repurposed x_refsource_misc
http://nodejs.com
Third Party Advisory x_refsource_misc
https://www.npmjs.com/~david
Issue Tracking, Third Party Advisory x_refsource_misc
https://github.com/adaltas/node-mixme/issues/1
Patch, Third Party Advisory x_refsource_misc
https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028
Patch, Third Party Advisory x_refsource_misc
https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20210618-0005/
Scores
CVSS v3
9.1
EPSS
0.0116
EPSS Percentile
78.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Details
CWE
CWE-1321
Status
published
Products (2)
adaltas/mixme
< 0.5.1
npm/mixme
0 - 0.5.1npm
Published
May 03, 2021
Tracked Since
Feb 18, 2026