Skip to content

Commit 34580b1

Browse files
New vuln: Prototype Pollution in js-yaml
1 parent c28e14a commit 34580b1

File tree

1 file changed

+21
-12
lines changed

1 file changed

+21
-12
lines changed

input/new.json

Lines changed: 21 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,24 @@
11
{
2-
"package_name": "",
3-
"patch_versions": [],
4-
"vulnerable_ranges": [],
5-
"cwe": [],
6-
"tldr": "",
7-
"doest_this_affect_me": "",
8-
"how_to_fix": "",
9-
"vulnerable_to": "",
2+
"package_name": "js-yaml",
3+
"patch_versions": [
4+
"4.1.1"
5+
],
6+
"vulnerable_ranges": [
7+
[
8+
"3.0.0",
9+
"4.1.0"
10+
]
11+
],
12+
"cwe": [
13+
"CWE-1321"
14+
],
15+
"tldr": "Affected versions of this package are vulnerable to Prototype Pollution, where the code insufficiently validates properties during merging by checking only own properties with _hasOwnProperty, allowing attackers to craft malicious YAML input that injects keys like `__proto__` or `constructor` into the object prototype. This vulnerability can lead to remote code execution, denial of service, or other security breaches when the polluted objects are handled in the application.",
16+
"doest_this_affect_me": "You are affected if you are using a version that falls within the vulnerable range.",
17+
"how_to_fix": "Upgrade the `js-yaml` library to the patch version.",
18+
"vulnerable_to": "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')",
1019
"related_cve_id": "",
11-
"language": "",
12-
"severity_class": "",
13-
"aikido_score": 0,
14-
"changelog": ""
20+
"language": "JS",
21+
"severity_class": "MEDIUM",
22+
"aikido_score": 47,
23+
"changelog": "https://github.com/nodeca/js-yaml/blob/master/CHANGELOG.md#411---2025-11-12"
1524
}

0 commit comments

Comments
 (0)