Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2022-02-24 19:15
Updated : 2024-11-21 06:45
NVD link : CVE-2022-21824
Mitre link : CVE-2022-21824
CVE.ORG link : CVE-2022-21824
JSON object : View
Products Affected
oracle
- mysql_connectors
- peoplesoft_enterprise_peopletools
- mysql_enterprise_monitor
- mysql_workbench
- mysql_cluster
- mysql_server
debian
- debian_linux
netapp
- snapcenter
- oncommand_workflow_automation
- oncommand_insight
nodejs
- node.js