Name | CVE-2021-23434 |
Description | This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operator returns always false when the type of the operands is different. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3291-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
node-object-path (PTS) | buster | 0.11.4-2+deb10u1 | vulnerable |
| buster (security) | 0.11.4-2+deb10u2 | fixed |
| bullseye | 0.11.5-3+deb11u1 | fixed |
| sid, trixie, bookworm | 0.11.8+~0.11.1-2 | fixed |
The information below is based on the following data on fixed versions.
Notes
[stretch] - node-object-path <end-of-life> (Nodejs in stretch not covered by security support)
https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453
https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb