CVE-2021-23624:
Prototype Pollution in dotty
5.6
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.61565%
CWE
Published
11/8/2021
Updated
2/1/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
dotty | npm | < 0.1.2 | 0.1.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The key evidence comes from the patch commit which modified the 'put' function to explicitly cast path.shift()
to a string (var key = "" + path.shift()
). This addresses type confusion vulnerabilities where array elements could be interpreted as object prototype references. The added security tests specifically validate()
against array-based prototype pollution attempts, and the CVE description explicitly calls out array-based path parameters as the attack vector.