Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. whois
  4. ›
  5. CVE-2020-36618

CVE-2020-36618: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

December 19, 2022

A vulnerability classified as critical has been found in Furqan node-whois. Affected is an unknown function of the file index.coffee. The manipulation leads to improperly controlled modification of object prototype attributes (‘prototype pollution’). It is possible to launch the attack remotely. The name of the patch is 46ccc2aee8d063c7b6b4dee2c2834113b7286076. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216252.

References

  • github.com/FurqanSoftware/node-whois/commit/46ccc2aee8d063c7b6b4dee2c2834113b7286076
  • github.com/FurqanSoftware/node-whois/pull/105
  • github.com/advisories/GHSA-97jv-c342-5xhc
  • nvd.nist.gov/vuln/detail/CVE-2020-36618
  • vuldb.com/?id.216252
  • web.archive.org/web/20220403104013/https://www.npmjs.com/package/whois

Code Behaviors & Features

Detect and mitigate CVE-2020-36618 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.13.6

Fixed versions

  • 2.13.6

Solution

Upgrade to version 2.13.6 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
  • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

npm/whois/CVE-2020-36618.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:55 +0000.