Vulnerability identifier: #VU92248
Vulnerability risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-1321
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
json-schema-ref-parser
Other software /
Other software solutions
Vendor: API Dev Tools
Description
The vulnerability allows a remote attacker to execute arbitrary JavaScript code.
The vulnerability exists due to improper input validation in the bundle()`, `parse()`, `resolve()`, `dereference() functions. A remote attacker can pass specially crafted input to the application and perform prototype pollution, which can result in information disclosure or data manipulation.
Mitigation
Install update from vendor's website.
Vulnerable software versions
json-schema-ref-parser: 11.0.0 - 11.1.0
External links
http://gist.github.com/tariqhawis/5db76b38112bba756615b688c32409ad
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.