Vulnerability Details : CVE-2020-5259
Potential exploit
In affected versions of dojox (NPM package), the jqMix method is vulnerable to Prototype Pollution. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values. This has been patched in versions 1.11.10, 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2
Products affected by CVE-2020-5259
- cpe:2.3:a:linuxfoundation:dojox:*:*:*:*:*:node.js:*:*
- cpe:2.3:a:linuxfoundation:dojox:*:*:*:*:*:node.js:*:*
- cpe:2.3:a:linuxfoundation:dojox:*:*:*:*:*:node.js:*:*
- cpe:2.3:a:linuxfoundation:dojox:*:*:*:*:*:node.js:*:*
- cpe:2.3:a:linuxfoundation:dojox:*:*:*:*:*:node.js:*:*
- cpe:2.3:a:linuxfoundation:dojox:*:*:*:*:*:node.js:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-5259
0.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 59 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-5259
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
8.6
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N |
3.9
|
4.0
|
NIST | |
7.7
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N |
1.3
|
5.8
|
GitHub, Inc. |
CWE ids for CVE-2020-5259
-
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2020-5259
-
https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da
Merge pull request from GHSA-3hw5-q855-g6cw · dojo/dojox@47d1b30 · GitHubPatch
-
https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html
[SECURITY] [DLA 2139-1] dojo security update
-
https://github.com/dojo/dojox/security/advisories/GHSA-3hw5-q855-g6cw
Prototype Pollution · Advisory · dojo/dojox · GitHubExploit;Third Party Advisory
Jump to