All the vulnerabilities related to the version 2.0.2 of the package
Prototype Pollution in json-ptr
This affects the package json-ptr
before 3.0.0
. A type confusion vulnerability can lead to a bypass of CVE-2020-7766 when the user-provided keys used in the pointer parameter are arrays.
Arbitrary Code Execution in json-ptr
There is a security vulnerability in json-ptr
versions prior to v2.1.0 in which an unscrupulous actor may execute arbitrary code. If your code sends un-sanitized user input to json-ptr's .get() method, your project is vulnerable to this injection-style vulnerability.
Arbitrary Code Execution in json-ptr
npm json-ptr
before 2.1.0 has an arbitrary code execution vulnerability. The issue occurs in the set operation when the force flag is set to true. The function recursively set the property in the target object, however it does not properly check the key being set, leading to a prototype pollution.