{"vulnerability": "cve-2021-41097", "sightings": [{"uuid": "f7c80278-c99e-4cb4-916e-7f3aa5841513", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-41097", "type": "seen", "source": "https://t.me/cibsecurity/29519", "content": "\u203c CVE-2021-41097 \u203c\n\naurelia-path is part of the Aurelia platform and contains utilities for path manipulation. There is a prototype pollution vulnerability in aurelia-path before version 1.1.7. The vulnerability exposes Aurelia application that uses `aurelia-path` package to parse a string. The majority of this will be Aurelia applications that employ the `aurelia-router` package. An example is this could allow an attacker to change the prototype of base object class `Object` by tricking an application to parse the following URL: `https://aurelia.io/blog/?__proto__[asdf]=asdf`. The problem is patched in version `1.1.7`.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-27T22:34:53.000000Z"}, {"uuid": "a124ef69-b518-4676-94c5-a108f59b4acd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-41097", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2021/CVE-2021-41097.yaml", "content": "", "creation_timestamp": "2026-01-28T03:48:04.000000Z"}, {"uuid": "51963f3f-a325-4364-8edf-92a726a609d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-41097", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mdloqbcdou24", "content": "", "creation_timestamp": "2026-01-29T21:02:28.576270Z"}]}