• 公告ID (KylinSec-SA-2023-1008)

摘要:

A vulnerability has been found in Starcounter-Jack JSON-Patch up to 3.1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.1 is able to address this issue. The name of the patch is 7ad6af41eabb2d799f698740a91284d762c955c9. It is recommended to upgrade the affected component. VDB-216778 is the identifier assigned to this vulnerability.

安全等级: Low

公告ID: KylinSec-SA-2023-1008

发布日期: 2023年1月6日

关联CVE: CVE-2021-4279  

  • 详细介绍

1. 漏洞描述

   

A vulnerability has been found in Starcounter-Jack JSON-Patch up to 3.1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.1 is able to address this issue. The name of the patch is 7ad6af41eabb2d799f698740a91284d762c955c9. It is recommended to upgrade the affected component. VDB-216778 is the identifier assigned to this vulnerability.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2021-4279 KY3.4-4A python-jsonpatch Unaffected
CVE-2021-4279 KY3.4-5 python-jsonpatch Unaffected
CVE-2021-4279 KY3.5.1 python-jsonpatch Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2023-1007 下一篇:KylinSec-SA-2023-1009