You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A prototype pollution vulnerability exists in the function copy in dom.js in the xmldom (published as @xmldom/xmldom) package before 0.8.3 for Node.js via the p variable. NOTE: the vendor states "we are in the process of marking this report as invalid"; however, some third parties takes the position that "A prototype injection/Prototype pollution is not just when global objects are polluted with recursive merge or deep cloning but also when a target object is polluted."
mend-app-cventbot
changed the title
CVE-2022-37616 (Medium) detected in xmldom-0.7.0.tgz, xmldom-0.7.5.tgz
CVE-2022-37616 (High) detected in xmldom-0.7.0.tgz, xmldom-0.7.5.tgz
Oct 12, 2022
mend-app-cventbot
changed the title
CVE-2022-37616 (High) detected in xmldom-0.7.0.tgz, xmldom-0.7.5.tgz
CVE-2022-37616 (Critical) detected in xmldom-0.7.0.tgz, xmldom-0.7.5.tgz
May 17, 2023
CVE-2022-37616 - Critical Severity Vulnerability
Vulnerable Libraries - xmldom-0.7.0.tgz, xmldom-0.7.5.tgz
xmldom-0.7.0.tgz
A pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module.
Library home page: https://registry.npmjs.org/@xmldom/xmldom/-/xmldom-0.7.0.tgz
Dependency Hierarchy:
xmldom-0.7.5.tgz
A pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module.
Library home page: https://registry.npmjs.org/@xmldom/xmldom/-/xmldom-0.7.5.tgz
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
A prototype pollution vulnerability exists in the function copy in dom.js in the xmldom (published as @xmldom/xmldom) package before 0.8.3 for Node.js via the p variable. NOTE: the vendor states "we are in the process of marking this report as invalid"; however, some third parties takes the position that "A prototype injection/Prototype pollution is not just when global objects are polluted with recursive merge or deep cloning but also when a target object is polluted."
Publish Date: 2022-10-11
URL: CVE-2022-37616
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37616
Release Date: 2022-10-11
Fix Resolution: @xmldom/xmldom - 0.8.3
The text was updated successfully, but these errors were encountered: