Debian Security Advisory
DLA-3291-1 node-object-path -- LTS security update
- Date Reported:
- 29 Jan 2023
- Affected Packages:
- node-object-path
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2021-3805, CVE-2021-23434.
- More information:
-
It was discovered that node-object-path, a Node.js module to access deep object properties using dot-separated paths, was vulnerable to prototype pollution.
- CVE-2021-3805
Prototype pollution vulnerability in the
del()
,empty()
,push()
andinsert()
functions when using theinherited props
mode (e.g. when a newobject-path
instance is created with theincludeInheritedProps
option set totrue
or when using thewithInheritedProps
default instance). - CVE-2021-23434
A type confusion vulnerability can lead to a bypass of the CVE-2020-15256 fix when the path components used in the path parameter are arrays, because the
===
operator returns alwaysfalse
when the type of the operands is different.
For Debian 10 buster, these problems have been fixed in version 0.11.4-2+deb10u2.
We recommend that you upgrade your node-object-path packages.
For the detailed security status of node-object-path please refer to its security tracker page at: https://security-tracker.debian.org/tracker/node-object-path
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2021-3805