CVE-2019-10808:
Improperly Controlled Modification of Dynamically-Determined Object Attributes in utilitify
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.72377%
CWE
Published
5/7/2021
Updated
1/27/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
utilitify | npm | < 1.0.3 | 1.0.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers around the merge functionality as explicitly stated in all advisory descriptions. While the actual patch code isn't shown, the Snyk report provides a clear proof-of-concept using mergeDeep and the CVE description specifically mentions the merge method. This function would appear in runtime profiling when processing malicious merge operations. The lack of prototype chain checks in object property merging (visible in the PoC's ability to set proto properties) makes mergeDeep the primary vulnerable function.