CVE-2024-57077

The latest version of utils-extend (1.0.8) is vulnerable to Prototype Pollution through the entry function(s) lib.extend. An attacker can supply a payload with Object.prototype setter to introduce or modify properties within the global prototype chain, causing denial of service (DoS) a the minimum consequence.
Configurations

No configuration.

History

24 Mar 2025, 16:15

Type Values Removed Values Added
CWE CWE-1321
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1

18 Feb 2025, 19:15

Type Values Removed Values Added
CWE CWE-1321
CVSS v2 : unknown
v3 : 9.1
v2 : unknown
v3 : unknown

06 Feb 2025, 15:15

Type Values Removed Values Added
CWE CWE-1321
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
Summary
  • (es) La última versión de utils-extend (1.0.8) es vulnerable a la contaminación de prototipos a través de las funciones de entrada lib.extend. Un atacante puede proporcionar un payload con el definidor Object.prototype para introducir o modificar propiedades dentro de la cadena de prototipos global, lo que provoca una denegación de servicio (DoS) como consecuencia mínima.

05 Feb 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-05 22:15

Updated : 2025-03-24 16:15


NVD link : CVE-2024-57077

Mitre link : CVE-2024-57077

CVE.ORG link : CVE-2024-57077


JSON object : View

Products Affected

No product.

CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')