Description
All versions of smart-extend
are vulnerable to Prototype Pollution. The deep()
function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects.
Recommendation
No fix is available yet. Followings are affected versions:
- >= 0
References
Related Issues
- DOMpurify has a nesting-based mXSS - CVE-2024-47875
- Path Traversal in simplehttpserver - CVE-2018-16478
- Cross-Site Scripting in html-pages - CVE-2018-16481
- Path Traversal in http-server-node - CVE-2021-23797
- Tags:
- npm
- smart-extend
Anything's wrong? Let us know Last updated on January 09, 2023