Vulnerability Description
Versions of the package bun after 0.0.12 and before 1.1.30 are vulnerable to Prototype Pollution due to improper input sanitization. An attacker can exploit this vulnerability through Bun's APIs that accept objects. **Note:** This issue relates to the widely known and actively developed 'Bun' JavaScript runtime. The bun package on NPM at versions 0.0.12 and below belongs to a different and older project that happened to claim the 'bun' name in the past.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/oven-sh/bun/commit/a234e067a5dc7837602df3fb5489e826920cc65a
- https://github.com/oven-sh/bun/pull/14119
- https://security.snyk.io/vuln/SNYK-JS-BUN-8499549
FAQ
What is CVE-2024-21548?
CVE-2024-21548 is a vulnerability with a CVSS score of 7.5 (HIGH). Versions of the package bun after 0.0.12 and before 1.1.30 are vulnerable to Prototype Pollution due to improper input sanitization. An attacker can exploit this vulnerability through Bun's APIs that ...
How severe is CVE-2024-21548?
CVE-2024-21548 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-21548?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.