CVE-2022-23623:
Validation bypass in frourio
8.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.57327%
CWE
Published
2/7/2022
Updated
7/13/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
frourio | npm | < 0.26.0 | 0.26.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from using Object.assign()
to create validator class instances from request data. This approach fails to properly handle nested object structures and class-validator
decorators' metadata requirements. The patched commit explicitly replaces these Object.assign()
calls with class-transformer's plainToInstance()
method, which properly handles nested validation through type transformation and metadata reflection. The affected code paths are found in multiple server configuration files ($server.ts
) where request validation occurs.