assign-deep
Behoben in
0.4.7
CVE-2018-3720 describes a prototype pollution vulnerability affecting versions of the assign-deep library prior to 0.4.7. Prototype pollution allows attackers to inject arbitrary properties into the prototypes of JavaScript objects, potentially impacting application behavior and security. This vulnerability can lead to unexpected errors or even denial-of-service conditions. Updating to version 0.4.7 or later resolves this issue.
Prototype pollution vulnerabilities, like CVE-2018-3720, can have significant consequences. An attacker exploiting this flaw could inject malicious properties into the prototypes of JavaScript objects used throughout an application. This could lead to unexpected behavior, data corruption, or even denial-of-service. For example, an attacker might modify the prototype of Array to inject a malicious function that executes whenever an array is iterated over. The blast radius depends on how extensively assign-deep is used within the application and the sensitivity of the data being processed. While direct remote code execution is unlikely, the manipulation of object properties can be leveraged to bypass security checks or alter application logic.
CVE-2018-3720 was published on July 26, 2018. There is no indication of this vulnerability being actively exploited in the wild. It is not currently listed on KEV (Known Exploited Vulnerabilities) or EPSS (Exploit Prediction Scoring System). Public proof-of-concept (POC) code is available, demonstrating the feasibility of prototype pollution attacks using assign-deep. The CVSS score of 8.8 (HIGH) reflects the potential impact of this vulnerability.
Exploit-Status
EPSS
0.43% (62% Perzentil)
CVSS-Vektor
The primary mitigation for CVE-2018-3720 is to upgrade the assign-deep library to version 0.4.7 or later. If upgrading is not immediately feasible due to compatibility concerns or breaking changes, consider implementing input validation and sanitization to prevent malicious data from being merged into objects. While not a complete solution, this can reduce the attack surface. Review your code for any instances where assign-deep is used to merge data from untrusted sources. There are no specific WAF rules or detection signatures readily available for this particular prototype pollution vulnerability, so focusing on code review and input validation is crucial. After upgrading, confirm the fix by running tests that specifically target object merging and property access to ensure no unexpected behavior arises.
Kein offizieller Patch verfügbar. Prüfe auf Workarounds oder überwache auf Updates.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2018-3720 is a high-severity vulnerability in assign-deep versions before 0.4.7 that allows attackers to manipulate object prototypes, potentially leading to unexpected application behavior or denial-of-service.
You are affected if you are using assign-deep versions earlier than 0.4.7 in your project. Check your project's dependencies to determine if you are using a vulnerable version.
The recommended fix is to upgrade to assign-deep version 0.4.7 or later. This resolves the prototype pollution vulnerability.
There is no public evidence of CVE-2018-3720 being actively exploited in the wild, but the vulnerability remains a potential risk.
Refer to the assign-deep project's repository or documentation for the advisory related to CVE-2018-3720. Check npm package details for version information.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.