CVE-2019-19507: Validation bypass is possible in Json Pattern Validator
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.48155%
CWE
Published
12/4/2019
Updated
1/9/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
jpv | npm | < 2.1.1 | 2.1.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The CVE explicitly identifies compareCommon()
as the vulnerable function where type validation occurs via constructor.name checks. The GitHub Issue #6 shows this check happening in validation logic (value.constructor.name comparison) which would be contained in compareCommon
. The validate()
function is the entry point that processes attacker-controlled JSON and triggers compareCommon
, making both functions relevant for runtime detection. The vulnerability stems from trusting mutable constructor properties for type validation.