GHSA-rc4v-99cr-pjcm: Prototype Pollution in ali-security/mongoose
10
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
10/17/2023
Updated
10/17/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
@seal-security/mongoose-fixed | npm | = 5.3.3 | 5.3.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the init function's handling of document initialization. The GitHub commit shows a fix adding checks for 'proto' and 'constructor' keys in the _init helper function. The Snyk PoC demonstrates exploitation via findByIdAndUpdate() with $rename targeting proto.polluted. While findByIdAndUpdate() is the attack vector, the root vulnerable code is in document.js's init implementation that processes these updates without prototype pollution protections prior to the patch.