CVE-2021-23434

NameCVE-2021-23434
DescriptionThis affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operator returns always false when the type of the operands is different.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3291-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
node-object-path (PTS)buster0.11.4-2+deb10u1vulnerable
buster (security)0.11.4-2+deb10u2fixed
bullseye0.11.5-3+deb11u1fixed
sid, trixie, bookworm0.11.8+~0.11.1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
node-object-pathsourcestretch(unfixed)end-of-life
node-object-pathsourcebuster0.11.4-2+deb10u2DLA-3291-1
node-object-pathsourcebullseye0.11.5-3+deb11u1
node-object-pathsource(unstable)0.11.7-1

Notes

[stretch] - node-object-path <end-of-life> (Nodejs in stretch not covered by security support)
https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453
https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb

Search for package or bug name: Reporting problems