All the vulnerabilities related to the version 2.1.0 of the package
Prototype Pollution in dset
All versions of dset
prior to 3.1.2 are vulnerable to Prototype Pollution via dset/merge
mode, as the dset
function checks for prototype pollution by validating if the top-level path contains __proto__
, constructor
or prototype
. By crafting a malicious object, it is possible to bypass this check and achieve prototype pollution.
dset Prototype Pollution vulnerability
Versions of the package dset before 3.1.4 are vulnerable to Prototype Pollution via the dset function due improper user input sanitization. This vulnerability allows the attacker to inject malicious object property using the built-in Object property proto, which is recursively assigned to all the objects in the program.