#VU105895 Prototype pollution in deep-merge - CVE-2024-38986


Vulnerability identifier: #VU105895

Vulnerability risk: Critical

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Red]

CVE-ID: CVE-2024-38986

CWE-ID: CWE-1321

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
deep-merge
Other software / Other software solutions

Vendor: 75lb

Description

The vulnerability allows a remote attacker to execute arbitrary JavaScript code.

The vulnerability exists due to improper input validation. A remote attacker can merge methods of lodash to merge objects, which can result in information disclosure or data manipulation.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability..

Vulnerable software versions

deep-merge: 1.1.1


External links
https://gist.github.com/mestrtee/b20c3aee8bea16e1863933778da6e4cb


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability