CVE-2019-18413
CVSS V2 High 7.5
CVSS V3 Critical 9.8
Description
In TypeStack class-validator 0.10.2, validate() input validation can be bypassed because certain internal attributes can be overwritten via a conflicting name. Even though there is an optional forbidUnknownValues parameter that can be used to reduce the risk of this bypass, this option is not documented and thus most developers configure input validation in the vulnerable default manner. With this vulnerability, attackers can launch SQL Injection or XSS attacks by injecting arbitrary malicious input. NOTE: a software maintainer agrees with the "is not documented" finding but suggests that much of the responsibility for the risk lies in a different product.
Overview
- CVE ID
- CVE-2019-18413
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2019-10-24T18:15:11
- Last Modified Date
- 2023-02-28T15:10:31
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:typestack_class-validator_project:typestack_class-validator:0.10.2:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- PARTIAL
- Base Score
- 7.5
- Severity
- HIGH
- Exploitability Score
- 10
- Impact Score
- 6.4
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 9.8
- Base Severity
- CRITICAL
- Exploitability Score
- 3.9
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://github.com/typestack/class-validator#passing-options | Third Party Advisory |
https://github.com/typestack/class-validator/issues/1422#issuecomment-1344635415 | |
https://github.com/typestack/class-validator/issues/438 | Exploit Issue Tracking Third Party Advisory |
https://github.com/typestack/class-validator/issues/438#issuecomment-964728471 | Exploit Issue Tracking Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2019-18413 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18413 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 06:42:45 | Added to TrackCVE | |||
2022-12-04 04:59:14 | 2019-10-24T18:15Z | 2019-10-24T18:15:11 | CVE Published Date | updated |
2022-12-04 04:59:14 | 2021-12-07T20:39:21 | CVE Modified Date | updated | |
2022-12-04 04:59:14 | Analyzed | Vulnerability Status | updated | |
2022-12-14 15:09:17 | 2022-12-14T14:15:10 | CVE Modified Date | updated | |
2022-12-14 15:09:17 | Analyzed | Modified | Vulnerability Status | updated |
2022-12-14 15:09:18 | References | updated | ||
2022-12-19 04:18:15 | Modified | Undergoing Analysis | Vulnerability Status | updated |
2023-02-28 16:08:40 | 2023-02-28T15:10:31 | CVE Modified Date | updated | |
2023-02-28 16:08:40 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |