ghsa-3hw5-q855-g6cw
Vulnerability from github
The Dojox jQuery wrapper jqMix
mixin method is vulnerable to Prototype Pollution.
Affected Area:
//https://github.com/dojo/dojox/blob/master/jq.js#L442
var tobj = {};
for(var x in props){
// the "tobj" condition avoid copying properties in "props"
// inherited from Object.prototype. For example, if obj has a custom
// toString() method, don't overwrite it with the toString() method
// that props inherited from Object.prototype
if((tobj[x] === undefined || tobj[x] != props[x]) && props[x] !== undefined && obj != props[x]){
if(dojo.isObject(obj[x]) && dojo.isObject(props[x])){
if(dojo.isArray(props[x])){
obj[x] = props[x];
}else{
obj[x] = jqMix(obj[x], props[x]);
}
}else{
obj[x] = props[x];
}
{ affected: [ { package: { ecosystem: "npm", name: "dojox", }, ranges: [ { events: [ { introduced: "0", }, { fixed: "1.11.10", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "npm", name: "dojox", }, ranges: [ { events: [ { introduced: "1.12.0", }, { fixed: "1.12.8", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "npm", name: "dojox", }, ranges: [ { events: [ { introduced: "1.13.0", }, { fixed: "1.13.7", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "npm", name: "dojox", }, ranges: [ { events: [ { introduced: "1.14.0", }, { fixed: "1.14.6", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "npm", name: "dojox", }, ranges: [ { events: [ { introduced: "1.15.0", }, { fixed: "1.15.3", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "npm", name: "dojox", }, ranges: [ { events: [ { introduced: "1.16.0", }, { fixed: "1.16.2", }, ], type: "ECOSYSTEM", }, ], }, ], aliases: [ "CVE-2020-5259", ], database_specific: { cwe_ids: [ "CWE-94", ], github_reviewed: true, github_reviewed_at: "2020-03-10T18:02:07Z", nvd_published_at: null, severity: "LOW", }, details: "The Dojox jQuery wrapper `jqMix` mixin method is vulnerable to Prototype Pollution. \n\nAffected Area:\n```\n//https://github.com/dojo/dojox/blob/master/jq.js#L442\n\t\tvar tobj = {};\n\t\tfor(var x in props){\n\t\t\t// the \"tobj\" condition avoid copying properties in \"props\"\n\t\t\t// inherited from Object.prototype. For example, if obj has a custom\n\t\t\t// toString() method, don't overwrite it with the toString() method\n\t\t\t// that props inherited from Object.prototype\n\t\t\tif((tobj[x] === undefined || tobj[x] != props[x]) && props[x] !== undefined && obj != props[x]){\n\t\t\t\tif(dojo.isObject(obj[x]) && dojo.isObject(props[x])){\n\t\t\t\t\tif(dojo.isArray(props[x])){\n\t\t\t\t\t\tobj[x] = props[x];\n\t\t\t\t\t}else{\n\t\t\t\t\t\tobj[x] = jqMix(obj[x], props[x]);\n\t\t\t\t\t}\n\t\t\t\t}else{\n\t\t\t\t\tobj[x] = props[x];\n\t\t\t\t}\n```", id: "GHSA-3hw5-q855-g6cw", modified: "2021-02-18T19:45:35Z", published: "2020-03-10T18:03:32Z", references: [ { type: "WEB", url: "https://github.com/dojo/dojox/security/advisories/GHSA-3hw5-q855-g6cw", }, { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-5259", }, { type: "WEB", url: "https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N", type: "CVSS_V3", }, ], summary: "Prototype Pollution in Dojox", }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.