Name | CVE-2021-23434 |
Description | This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operator returns always false when the type of the operands is different. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3291-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
node-object-path (PTS) | bullseye | 0.11.5-3+deb11u1 | fixed |
sid, trixie, bookworm | 0.11.8+~0.11.1-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
node-object-path | source | stretch | (unfixed) | end-of-life | ||
node-object-path | source | buster | 0.11.4-2+deb10u2 | DLA-3291-1 | ||
node-object-path | source | bullseye | 0.11.5-3+deb11u1 | |||
node-object-path | source | (unstable) | 0.11.7-1 |
[stretch] - node-object-path <end-of-life> (Nodejs in stretch not covered by security support)
https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453
https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb