Description
Prototype pollution vulnerability via .parse() in Plist allows attackers to cause a Denial of Service (DoS) and may lead to remote code execution.
Recommendation
Update the plist package to the latest compatible version. Followings are version details:
- Affected version(s): < 3.0.5
- Patched version(s): 3.0.5
References
Related Issues
- jquery-validation Regular Expression Denial of Service due to arbitrary input to url2 method - CVE-2022-31147
- Regular expression denial of service in devcert - CVE-2022-1929
- Parse Server before v3.4.1 vulnerable to Denial of Service - CVE-2019-1020012
- steal vulnerable to Prototype Pollution via optionName variable - CVE-2022-37264
- Tags:
- npm
- plist
Anything's wrong? Let us know Last updated on November 29, 2023