CVE-2020-36618: FurqanSoftware/node-whois vulnerable to Prototype Pollution
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.22216%
CWE
Published
12/19/2022
Updated
1/29/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| whois | npm | < 2.13.6 | 2.13.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the lookup function's failure to validate the 'addr' parameter. The patch (46ccc2a) explicitly adds a check for 'proto' in the addr parameter and rejects it, indicating this was the injection point. The prototype pollution occurred because the function processed attacker-controlled keys that could modify prototype properties. The CWE-1321 classification and GitHub advisory confirm this is a prototype pollution vulnerability in the lookup flow.