Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CX: CVE-2021-23436 in Npm-immer and 8.0.1 @ TodoList_mern.main #30

Open
itsKedar opened this issue Jul 26, 2022 · 0 comments
Open

CX: CVE-2021-23436 in Npm-immer and 8.0.1 @ TodoList_mern.main #30

itsKedar opened this issue Jul 26, 2022 · 0 comments

Comments

@itsKedar
Copy link
Owner

Description

This affects the package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition (p === "proto" || p === "constructor") in applyPatches_ returns false if p is ['proto'] (or ['constructor']). The === operator (strict equality operator) returns false if the operands have different type.

HIGH Vulnerable Package issue exists @ immer in branch main

Vulnerability ID: CVE-2021-23436

Package Name: immer

Severity: HIGH

CVSS Score: 9.8

Publish Date: 2021-09-01T18:15:00

Current Package Version: 8.0.1

Remediation Upgrade Recommendation: 9.0.6

Link To SCA

Reference – NVD link

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant