The latest version of utils-extend (1.0.8) is vulnerable to Prototype Pollution through the entry function(s) lib.extend. An attacker can supply a payload with Object.prototype setter to introduce or modify properties within the global prototype chain, causing denial of service (DoS) a the minimum consequence.
References
Configurations
No configuration.
History
No history.
Information
Published : 2025-02-05 22:15
Updated : 2025-03-24 16:15
NVD link : CVE-2024-57077
Mitre link : CVE-2024-57077
CVE.ORG link : CVE-2024-57077
JSON object : View
Products Affected
No product.
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
