Miggo Logo

CVE-2020-8147: Prototype Pollution

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.77213%
Published
9/3/2020
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
utils-extendnpm>= 0.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly states the extend function in utils-extend is vulnerable to prototype pollution. Prototype pollution vulnerabilities typically occur in object-merging functions that fail to restrict modifications to the Object prototype. Multiple authoritative sources (GitHub Advisory, NVD, HackerOne) directly attribute the vulnerability to this function. The lack of input validation for prototype-modifying properties aligns with CWE-471 (MAID) and matches the mechanics of prototype pollution attacks.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ll v*rsions o* `utils-*xt*n*` *r* vuln*r**l* to prototyp* pollution. T** `*xt*n*` *un*tion *o*s not r*stri*t t** mo*i*i**tion o* *n O*j**t's prototyp*, w*i** m*y *llow *n *tt**k*r to *** or mo*i*y *n *xistin* prop*rty t**t will *xist on *ll o*j**ts.

Reasoning

T** vuln*r**ility **s*ription *xpli*itly st*t*s t** `*xt*n*` *un*tion in utils-*xt*n* is vuln*r**l* to prototyp* pollution. Prototyp* pollution vuln*r**iliti*s typi**lly o**ur in o*j**t-m*r*in* *un*tions t**t **il to r*stri*t mo*i*i**tions to t** O*j