@intlify/shared is a shared library for the intlify project. The latest version of @intlify/shared (10.0.4) is vulnerable to Prototype Pollution through the entry function(s) lib.deepCopy. An attacker can supply a payload with Object.prototype setter to introduce or modify properties within the global prototype chain, causing denial of service (DoS) as the minimum consequence. Moreover, the consequences of this vulnerability can escalate to other injection-based attacks, depending on how the library integrates within the application. For instance, if the polluted property propagates to sensitive Node.js APIs (e.g., exec, eval), it could enable an attacker to execute arbitrary commands within the application's context. This issue has been addressed in versions 9.14.2, and 10.0.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Tue, 03 Dec 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Intlify
Intlify vue-i18n
CPEs cpe:2.3:a:intlify:vue-i18n:*:*:*:*:*:*:*:*
Vendors & Products Intlify
Intlify vue-i18n
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 29 Nov 2024 18:45:00 +0000

Type Values Removed Values Added
Description @intlify/shared is a shared library for the intlify project. The latest version of @intlify/shared (10.0.4) is vulnerable to Prototype Pollution through the entry function(s) lib.deepCopy. An attacker can supply a payload with Object.prototype setter to introduce or modify properties within the global prototype chain, causing denial of service (DoS) as the minimum consequence. Moreover, the consequences of this vulnerability can escalate to other injection-based attacks, depending on how the library integrates within the application. For instance, if the polluted property propagates to sensitive Node.js APIs (e.g., exec, eval), it could enable an attacker to execute arbitrary commands within the application's context. This issue has been addressed in versions 9.14.2, and 10.0.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Title Prototype Pollution in @intlify/shared >=9.7.0 <= 10.0.4
Weaknesses CWE-1321
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-11-29T18:36:08.638Z

Updated: 2024-12-03T14:06:41.359Z

Reserved: 2024-11-15T17:11:13.443Z

Link: CVE-2024-52810

cve-icon Vulnrichment

Updated: 2024-12-03T14:06:07.601Z

cve-icon NVD

Status : Received

Published: 2024-11-29T19:15:09.163

Modified: 2024-11-29T19:15:09.163

Link: CVE-2024-52810

cve-icon Redhat

No data.