CVE-2024-32866
CVSS V2 None
CVSS V3 None
Description
Conform, a type-safe form validation library, allows the parsing of nested objects in the form of `object.property`. Due to an improper implementation of this feature in versions prior to 1.1.1, an attacker can exploit the feature to trigger prototype pollution by passing a crafted input to `parseWith...` functions. Applications that use conform for server-side validation of form data or URL parameters are affected by this vulnerability. Version 1.1.1 contains a patch for the issue.
Overview
- CVE ID
- CVE-2024-32866
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-04-23T21:07:06.216Z
- Last Modified Date
- 2024-06-04T17:50:16.913Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/edmundhung/conform/security/advisories/GHSA-624g-8qjg-8qxf | x_refsource_CONFIRM |
https://github.com/edmundhung/conform/commit/4819d51b5a53fd5486fc85c17cdc148eb160e3de | x_refsource_MISC |
https://github.com/edmundhung/conform/blob/59156d7115a7207fa3b6f8a70a4342a9b24c2501/packages/conform-dom/formdata.ts#L117 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-32866 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32866 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 08:16:56 | Added to TrackCVE |