CVE-2020-28441: conf-cfg-ini Prototype Pollution via malicious INI file before v1.2.2
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.29419%
CWE
Published
7/26/2022
Updated
1/27/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| conf-cfg-ini | npm | < 1.2.2 | 1.2.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the decode function's handling of INI parsing. The patch adds validation checks for protected prototype-related keys (proto, defineGetter, etc.) in two critical areas: 1) When creating new sections, and 2) When processing key-value pairs. The vulnerable versions lacked these checks, allowing attackers to use specially crafted section headers or keys to modify the Object prototype. The commit diff clearly shows these security checks were added to the decode function, and the CVE description specifically mentions exploitation through the decode method.