You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This affects the package convict before 6.2.3. This is a bypass of CVE-2022-22143. The fix introduced, relies on the startsWith method and does not prevent the vulnerability: before splitting the path, it checks if it starts with proto or this.constructor.prototype. To bypass this check it's possible to prepend the dangerous paths with any string value followed by a dot, like for example foo.proto or foo.this.constructor.prototype.
mend-bolt-for-githubbot
changed the title
CVE-2022-21190 (High) detected in convict-4.4.0.tgz
CVE-2022-21190 (High) detected in convict-4.4.0.tgz - autoclosed
Jul 23, 2022
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
CVE-2022-21190 - High Severity Vulnerability
Vulnerable Library - convict-4.4.0.tgz
Featureful configuration management library for Node.js (nested structure, schema validation, etc.)
Library home page: https://registry.npmjs.org/convict/-/convict-4.4.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/convict/package.json
Dependency Hierarchy:
Found in HEAD commit: 2ed96566365ee89d8a9b1250ccd7c049281ed09c
Found in base branch: master
Vulnerability Details
This affects the package convict before 6.2.3. This is a bypass of CVE-2022-22143. The fix introduced, relies on the startsWith method and does not prevent the vulnerability: before splitting the path, it checks if it starts with proto or this.constructor.prototype. To bypass this check it's possible to prepend the dangerous paths with any string value followed by a dot, like for example foo.proto or foo.this.constructor.prototype.
Publish Date: 2022-05-13
URL: CVE-2022-21190
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2022-05-13
Fix Resolution: 6.2.3
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: