CVE-2020-5258
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
10/03/2020
Last modified:
07/11/2023
Description
In affected versions of dojo (NPM package), the deepCopy method is vulnerable to Prototype Pollution. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values. This has been patched in versions 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2
Impact
Base Score 3.x
7.70
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:linuxfoundation:dojo:*:*:*:*:*:node.js:*:* | 1.11.10 (excluding) | |
| cpe:2.3:a:linuxfoundation:dojo:*:*:*:*:*:node.js:*:* | 1.12.0 (including) | 1.12.8 (excluding) |
| cpe:2.3:a:linuxfoundation:dojo:*:*:*:*:*:node.js:*:* | 1.13.0 (including) | 1.13.7 (excluding) |
| cpe:2.3:a:linuxfoundation:dojo:*:*:*:*:*:node.js:*:* | 1.14.0 (including) | 1.14.6 (excluding) |
| cpe:2.3:a:linuxfoundation:dojo:*:*:*:*:*:node.js:*:* | 1.15.0 (including) | 1.15.3 (excluding) |
| cpe:2.3:a:linuxfoundation:dojo:*:*:*:*:*:node.js:*:* | 1.16.0 (including) | 1.16.2 (excluding) |
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_application_session_controller:3.9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:documaker:*:*:*:*:*:*:*:* | 12.6.0 (including) | 12.6.4 (including) |
| cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 7.3.0 (including) | 7.3.29 (including) |
| cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 7.4.0 (including) | 7.4.28 (including) |
| cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 7.5.0 (including) | 7.5.18 (including) |
| cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 7.6.0 (including) | 7.6.14 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/dojo/dojo/commit/20a00afb68f5587946dc76fbeaa68c39bda2171d
- https://github.com/dojo/dojo/security/advisories/GHSA-jxfh-8wgv-vfr2
- https://lists.apache.org/thread.html/r3638722360d7ae95f874280518b8d987d799a76df7a9cd78eac33a1b%40%3Cusers.qpid.apache.org%3E
- https://lists.apache.org/thread.html/r665fcc152bd0fec9f71511a6c2435ff24d3a71386b01b1a6df326fd3%40%3Cusers.qpid.apache.org%3E
- https://lists.apache.org/thread.html/rf481b3f25f05c52ba4e24991a941c1a6e88d281c6c9360a806554d00%40%3Cusers.qpid.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html



