Miggo Logo

GHSA-c3px-v9c7-m734: Prototype Pollution in mithril

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
9/3/2020
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
mithrilnpm< 1.1.71.1.7
mithrilnpm>= 2.0.0, < 2.0.22.0.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The GitHub advisory directly identifies parseQueryString as the vulnerable function. Runtime exploitation would involve this function processing attacker-controlled query parameters. A profiler would show this function actively parsing the malicious payload (e.g., during route handling or AJAX parameter parsing). No other functions are explicitly mentioned in the advisory as being involved in the vulnerability. The lack of prototype pollution checks in the parameter assignment logic is the root cause.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*****t** v*rsions o* `mit*ril`*r* vuln*r**l* to prototyp* pollution. T** *un*tion `p*rs*Qu*ryStrin*` m*y *llow * m*li*ious us*r to mo*i*y t** prototyp* o* `O*j**t`, **usin* t** ***ition or mo*i*i**tion o* *n *xistin* prop*rty t**t will *xist on *ll o

Reasoning

T** *it*u* **visory *ir**tly i**nti*i*s `p*rs*Qu*ryStrin*` *s t** vuln*r**l* *un*tion. Runtim* *xploit*tion woul* involv* t*is *un*tion pro**ssin* *tt**k*r-*ontroll** qu*ry p*r*m*t*rs. * pro*il*r woul* s*ow t*is *un*tion **tiv*ly p*rsin* t** m*li*iou