• 公告ID (KylinSec-SA-2023-1007)

摘要:

A vulnerability, which was classified as critical, has been found in json-pointer. Affected by this issue is the function set of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The name of the patch is 859c9984b6c407fc2d5a0a7e47c7274daa681941. It is recommended to apply a patch to fix this issue. VDB-216794 is the identifier assigned to this vulnerability.

安全等级: Low

公告ID: KylinSec-SA-2023-1007

发布日期: 2023年1月6日

关联CVE: CVE-2022-4742  

  • 详细介绍

1. 漏洞描述

   

A vulnerability, which was classified as critical, has been found in json-pointer. Affected by this issue is the function set of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The name of the patch is 859c9984b6c407fc2d5a0a7e47c7274daa681941. It is recommended to apply a patch to fix this issue. VDB-216794 is the identifier assigned to this vulnerability.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2022-4742 KY3.4-4A python-jsonpointer Unaffected
CVE-2022-4742 KY3.4-5 python-jsonpointer Unaffected
CVE-2022-4742 KY3.5.1 python-jsonpointer Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2023-1006 下一篇:KylinSec-SA-2023-1008