Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
1 vulnerability by litespeed.js_project
CVE-2021-23682 (GCVE-0-2021-23682)
Vulnerability from cvelistv5 – Published: 2022-02-16 17:05 – Updated: 2024-09-16 20:17
VLAI?
Title
Prototype Pollution
Summary
This affects the package litespeed.js before 0.3.12; the package appwrite/server-ce from 0.12.0 and before 0.12.2, before 0.11.1. When parsing the query string in the getJsonFromUrl function, the key that is set in the result object is not properly sanitized leading to a Prototype Pollution vulnerability.
Severity ?
CWE
- Prototype Pollution
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| n/a | litespeed.js |
Affected:
unspecified , < 0.3.12
(custom)
|
|||||||
|
|||||||||
Date Public ?
2022-02-16 00:00
Credits
Alessio Della Libera of Snyk Research Team
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T19:14:09.152Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://snyk.io/vuln/SNYK-JS-LITESPEEDJS-2359250"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://snyk.io/vuln/SNYK-PHP-APPWRITESERVERCE-2401820"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/litespeed-js/litespeed.js/pull/18"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/appwrite/appwrite/releases/tag/0.12.2"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/appwrite/appwrite/pull/2778"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/appwrite/appwrite/releases/tag/0.11.1"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "litespeed.js",
"vendor": "n/a",
"versions": [
{
"lessThan": "0.3.12",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "appwrite/server-ce",
"vendor": "n/a",
"versions": [
{
"lessThan": "unspecified",
"status": "affected",
"version": "0.12.0",
"versionType": "custom"
},
{
"lessThan": "0.12.2",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "0.11.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Alessio Della Libera of Snyk Research Team"
}
],
"datePublic": "2022-02-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "This affects the package litespeed.js before 0.3.12; the package appwrite/server-ce from 0.12.0 and before 0.12.2, before 0.11.1. When parsing the query string in the getJsonFromUrl function, the key that is set in the result object is not properly sanitized leading to a Prototype Pollution vulnerability."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"exploitCodeMaturity": "PROOF_OF_CONCEPT",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"scope": "UNCHANGED",
"temporalScore": 6.9,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Prototype Pollution",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-02-16T17:05:26.000Z",
"orgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730",
"shortName": "snyk"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://snyk.io/vuln/SNYK-JS-LITESPEEDJS-2359250"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://snyk.io/vuln/SNYK-PHP-APPWRITESERVERCE-2401820"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/litespeed-js/litespeed.js/pull/18"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/appwrite/appwrite/releases/tag/0.12.2"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/appwrite/appwrite/pull/2778"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/appwrite/appwrite/releases/tag/0.11.1"
}
],
"title": "Prototype Pollution",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "report@snyk.io",
"DATE_PUBLIC": "2022-02-16T17:03:36.924290Z",
"ID": "CVE-2021-23682",
"STATE": "PUBLIC",
"TITLE": "Prototype Pollution"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "litespeed.js",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "0.3.12"
}
]
}
}
]
},
"vendor_name": "n/a"
},
{
"product": {
"product_data": [
{
"product_name": "appwrite/server-ce",
"version": {
"version_data": [
{
"version_affected": "\u003e=",
"version_value": "0.12.0"
},
{
"version_affected": "\u003c",
"version_value": "0.12.2"
},
{
"version_affected": "\u003c",
"version_value": "0.11.1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Alessio Della Libera of Snyk Research Team"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "This affects the package litespeed.js before 0.3.12; the package appwrite/server-ce from 0.12.0 and before 0.12.2, before 0.11.1. When parsing the query string in the getJsonFromUrl function, the key that is set in the result object is not properly sanitized leading to a Prototype Pollution vulnerability."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Prototype Pollution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://snyk.io/vuln/SNYK-JS-LITESPEEDJS-2359250",
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-LITESPEEDJS-2359250"
},
{
"name": "https://snyk.io/vuln/SNYK-PHP-APPWRITESERVERCE-2401820",
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-PHP-APPWRITESERVERCE-2401820"
},
{
"name": "https://github.com/litespeed-js/litespeed.js/pull/18",
"refsource": "MISC",
"url": "https://github.com/litespeed-js/litespeed.js/pull/18"
},
{
"name": "https://github.com/appwrite/appwrite/releases/tag/0.12.2",
"refsource": "MISC",
"url": "https://github.com/appwrite/appwrite/releases/tag/0.12.2"
},
{
"name": "https://github.com/appwrite/appwrite/pull/2778",
"refsource": "MISC",
"url": "https://github.com/appwrite/appwrite/pull/2778"
},
{
"name": "https://github.com/appwrite/appwrite/releases/tag/0.11.1",
"refsource": "MISC",
"url": "https://github.com/appwrite/appwrite/releases/tag/0.11.1"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730",
"assignerShortName": "snyk",
"cveId": "CVE-2021-23682",
"datePublished": "2022-02-16T17:05:26.116Z",
"dateReserved": "2021-01-08T00:00:00.000Z",
"dateUpdated": "2024-09-16T20:17:30.120Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}