Prototype Pollution Vulnerability in Node.js mixme v0.5.1 and earlier

Prototype Pollution Vulnerability in Node.js mixme v0.5.1 and earlier

CVE-2021-28860 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

In Node.js mixme, prior to v0.5.1, an attacker can add or alter properties of an object via '__proto__' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).

Learn more about our Web Application Penetration Testing UK.