GHSA-c3px-v9c7-m734: Prototype Pollution in mithril
N/A
CVSS Score
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
9/3/2020
Updated
1/9/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
mithril | npm | < 1.1.7 | 1.1.7 |
mithril | npm | >= 2.0.0, < 2.0.2 | 2.0.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The GitHub advisory directly identifies parseQueryString
as the vulnerable function. Runtime exploitation would involve this function processing attacker-controlled query parameters. A profiler would show this function actively parsing the malicious payload (e.g., during route handling or AJAX parameter parsing). No other functions are explicitly mentioned in the advisory as being involved in the vulnerability. The lack of prototype pollution checks in the parameter assignment logic is the root cause.