Show plain JSON{"id": "CVE-2019-10805", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2020-02-28T21:15:13.180", "references": [{"url": "https://snyk.io/vuln/SNYK-JS-VALIB-559015", "tags": ["Exploit", "Third Party Advisory"], "source": "report@snyk.io"}, {"url": "https://www.npmjs.com/package/valib", "tags": ["Third Party Advisory"], "source": "report@snyk.io"}, {"url": "https://snyk.io/vuln/SNYK-JS-VALIB-559015", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.npmjs.com/package/valib", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-668"}]}], "descriptions": [{"lang": "en", "value": "valib through 2.0.0 allows Internal Property Tampering. A maliciously crafted JavaScript object can bypass several inspection functions provided by valib. Valib uses a built-in function (hasOwnProperty) from the unsafe user-input to examine an object. It is possible for a crafted payload to overwrite this function to manipulate the inspection results to bypass security checks."}, {"lang": "es", "value": "valib versiones hasta 2.0.0, permite una Manipulaci\u00f3n de Propiedad Interna. Un objeto JavaScript dise\u00f1ado maliciosamente, puede omitir varias funciones de inspecci\u00f3n proporcionadas por valib. Valib usa una funcionalidad incorporada (hasOwnProperty) a partir de la entrada de usuario no segura para examinar un objeto. Es posible para una carga \u00fatil dise\u00f1ada sobrescribir esta funci\u00f3n para manipular los resultados de la inspecci\u00f3n para omitir los controles de seguridad."}], "lastModified": "2024-11-21T04:19:57.310", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:sideralis:valib.js:*:*:*:*:*:node.js:*:*", "vulnerable": true, "matchCriteriaId": "C46D26A7-E87B-4089-83D6-7DE53537E2F7", "versionEndIncluding": "2.0.0"}], "operator": "OR"}]}], "sourceIdentifier": "report@snyk.io"}