CVE-2020-36618

Published: Dic 19, 2022 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2022-7576 Aliases: GHSA-97jv-c342-5xhc
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 6,3
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: low
Availability: low

Description

AI Translation Available

A vulnerability classified as critical has been found in Furqan node-whois. Affected is an unknown function of the file index.coffee. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to launch the attack remotely. The name of the patch is 46ccc2aee8d063c7b6b4dee2c2834113b7286076. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216252.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0054
Percentile
0,7th
Updated

EPSS Score Trend (Last 90 Days)

74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality Access Control Other Integrity Non-Repudiation
Potential Impacts:
Read Application Data Bypass Protection Mechanism Alter Execution Logic Other Hide Activities
Applicable Platforms
All platforms may be affected
View CWE Details
1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Availability
Potential Impacts:
Read Application Data Modify Application Data Dos: Crash, Exit, Or Restart
Applicable Platforms
Languages: JavaScript
View CWE Details
Application

Node Whois by Furqansofware

cpe:2.3:a:furqansofware:node_whois:-:*:*:*:*:node.js:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/FurqanSoftware/node-whois/commit/46ccc2aee8d063c7b6b4dee2c28…
https://github.com/FurqanSoftware/node-whois/pull/105
Exploit Issue Tracking Patch Third Party Advisory
https://github.com/FurqanSoftware/node-whois/pull/105
https://vuldb.com/?id.216252
Third Party Advisory
https://vuldb.com/?id.216252
https://github.com/FurqanSoftware/node-whois/commit/46ccc2aee8d063c7b6b4dee2c28…
https://github.com/FurqanSoftware/node-whois/pull/105
Exploit Issue Tracking Patch Third Party Advisory
https://github.com/FurqanSoftware/node-whois/pull/105
https://vuldb.com/?id.216252
Third Party Advisory
https://vuldb.com/?id.216252