CPANSA-MySQL-Admin-2019-11358-jquery: MySQL-Admin vulnerability

Publisher giterlizzi Document category csaf_security_advisory
Initial release date 2019-04-20T00:00:00 Engine CSAF Perl Toolkit 0.25
Current release date 2019-04-20T00:00:00 Build Date
Current version 1 Status final
CVSS v3.1 Base Score 6.1 Severity Medium
Original language Language en
Also referred to

Vulnerability Description

jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.

Vulnerabilities

CVE-2019-11358

Vulnerability Description

jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.

Weakness CWE-1321 : Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Product status

Known affected
Product Score
MySQL-Admin greater than or equal 1.16 and less than or equal 1.18
CVSS Version CVSS Vector CVSS Base Score CVSS Base Severity
3.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N 6.1 Medium
2.0 AV:N/AC:M/Au:N/C:N/I:P/A:N 4.3 Medium

giterlizzi

Namespace: https://github.com/giterlizzi/

gdt@cpan.org

References

Revision history

Version Date of the revision Summary of the revision
1 Sat Apr 20 00:00:00 2019 First release

Sharing rules

TLP:WHITE
For the TLP version see: https://www.first.org/tlp/