Vulnerability Description
dot-object before 2.1.3 is vulnerable to Prototype Pollution. The set function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dot-Object Project | Dot-Object | < 2.1.3 |
Related Weaknesses (CWE)
References
- https://github.com/rhalff/dot-object/commit/f76cff5fe6d01d30ce110d8f454db2e5bd28PatchThird Party Advisory
- https://snyk.io/vuln/SNYK-JS-DOTOBJECT-548905ExploitThird Party Advisory
- https://github.com/rhalff/dot-object/commit/f76cff5fe6d01d30ce110d8f454db2e5bd28PatchThird Party Advisory
- https://snyk.io/vuln/SNYK-JS-DOTOBJECT-548905ExploitThird Party Advisory
FAQ
What is CVE-2019-10793?
CVE-2019-10793 is a vulnerability with a CVSS score of 6.3 (MEDIUM). dot-object before 2.1.3 is vulnerable to Prototype Pollution. The set function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
How severe is CVE-2019-10793?
CVE-2019-10793 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-10793?
Check the references section above for vendor advisories and patch information. Affected products include: Dot-Object Project Dot-Object.