In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
References
| Link | Resource |
|---|---|
| https://github.com/manvel-khnkoyan/jpv/issues/6 | Exploit Issue Tracking Third Party Advisory |
| https://www.npmjs.com/package/jpv | Product |
| https://github.com/manvel-khnkoyan/jpv/issues/6 | Exploit Issue Tracking Third Party Advisory |
| https://www.npmjs.com/package/jpv | Product |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:34
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/manvel-khnkoyan/jpv/issues/6 - Exploit, Issue Tracking, Third Party Advisory | |
| References | () https://www.npmjs.com/package/jpv - Product |
Information
Published : 2019-12-02 17:15
Updated : 2024-11-21 04:34
NVD link : CVE-2019-19507
Mitre link : CVE-2019-19507
CVE.ORG link : CVE-2019-19507
JSON object : View
Products Affected
json_pattern_validator_project
- json_pattern_validator
CWE
CWE-287
Improper Authentication
