Summary
Affected versions of cloneextend (npm) are vulnerable to prototype pollution via the clone and extend functions.
Product
All versions of cloneextend npm package.
Impact
If untrusted data reaches one of the affected functions, prototype pollution can be achieved. The impact will depend on the application.
Steps to reproduce
1 | var ce = require('cloneextend'); |
Expected result:
1 will be printed to the console.
Remediation
Currently no fix has been released. As a workaround, avoid passing untrusted inputs to the vulnerable functions.
Credit
This issue was discovered and reported by Checkmarx SCA Security Researcher Yaniv Nizry.