Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. mout
  4. ›
  5. CVE-2022-21213

CVE-2022-21213: Prototype Pollution in mout

June 17, 2022 (updated June 28, 2022)

This affects all versions of package mout. The deepFillIn function can be used to ‘fill missing properties recursively’, while the deepMixIn mixes objects into the target object, recursively mixing existing child objects as well. In both cases, the key used to access the target object recursively is not checked, leading to exploiting this vulnerability. Note: This vulnerability derives from an incomplete fix of CVE-2020-7792.

References

  • github.com/advisories/GHSA-vvv8-xw5f-3f88
  • github.com/mout/mout/blob/master/src/object/deepFillIn.js
  • github.com/mout/mout/blob/master/src/object/deepMixIn.js
  • nvd.nist.gov/vuln/detail/CVE-2022-21213
  • snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2870623
  • snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2870622
  • snyk.io/vuln/SNYK-JS-MOUT-2342654

Code Behaviors & Features

Detect and mitigate CVE-2022-21213 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 1.2.3

Solution

Unfortunately, there is no solution available yet.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Source file

npm/mout/CVE-2022-21213.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:03 +0000.