CVE-2024-23339: Prototype pollution not blocked by object-path related utilities in hoolock
6.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.92575%
CWE
Published
1/23/2024
Updated
11/12/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
hoolock | npm | >= 2.0.0, < 2.2.1 | 2.2.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The advisory explicitly names get/set/update as the vulnerable functions that lacked prototype pollution protections. These utilities handled path-based operations without validating if the target properties were part of the object's own properties (via hasOwnProperty checks) or blocking prototype-related paths like proto. The patch adds TypeErrors for inherited properties, confirming these were the entry points for pollution.