CVE-2019-18413

In TypeStack class-validator 0.10.2, validate() input validation can be bypassed because certain internal attributes can be overwritten via a conflicting name. Even though there is an optional forbidUnknownValues parameter that can be used to reduce the risk of this bypass, this option is not documented and thus most developers configure input validation in the vulnerable default manner. With this vulnerability, attackers can launch SQL Injection or XSS attacks by injecting arbitrary malicious input. NOTE: a software maintainer agrees with the "is not documented" finding but suggests that much of the responsibility for the risk lies in a different product.
Configurations

Configuration 1 (hide)

cpe:2.3:a:typestack_class-validator_project:typestack_class-validator:0.10.2:*:*:*:*:*:*:*

History

21 Nov 2024, 04:33

Type Values Removed Values Added
References () https://github.com/typestack/class-validator#passing-options - Third Party Advisory () https://github.com/typestack/class-validator#passing-options - Third Party Advisory
References () https://github.com/typestack/class-validator/issues/1422#issuecomment-1344635415 - Issue Tracking, Release Notes, Third Party Advisory () https://github.com/typestack/class-validator/issues/1422#issuecomment-1344635415 - Issue Tracking, Release Notes, Third Party Advisory
References () https://github.com/typestack/class-validator/issues/438 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/typestack/class-validator/issues/438 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/typestack/class-validator/issues/438#issuecomment-964728471 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/typestack/class-validator/issues/438#issuecomment-964728471 - Exploit, Issue Tracking, Third Party Advisory
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 3.7

28 Feb 2023, 15:10

Type Values Removed Values Added
References (MISC) https://github.com/typestack/class-validator/issues/1422#issuecomment-1344635415 - (MISC) https://github.com/typestack/class-validator/issues/1422#issuecomment-1344635415 - Issue Tracking, Release Notes, Third Party Advisory

14 Dec 2022, 14:15

Type Values Removed Values Added
References
  • (MISC) https://github.com/typestack/class-validator/issues/1422#issuecomment-1344635415 -

07 Dec 2021, 20:39

Type Values Removed Values Added
References (MISC) https://github.com/typestack/class-validator/issues/438#issuecomment-964728471 - (MISC) https://github.com/typestack/class-validator/issues/438#issuecomment-964728471 - Exploit, Issue Tracking, Third Party Advisory

10 Nov 2021, 06:15

Type Values Removed Values Added
References
  • (MISC) https://github.com/typestack/class-validator/issues/438#issuecomment-964728471 -

18 Oct 2021, 12:05

Type Values Removed Values Added
References (MISC) https://github.com/typestack/class-validator#passing-options - (MISC) https://github.com/typestack/class-validator#passing-options - Third Party Advisory

28 Sep 2021, 10:15

Type Values Removed Values Added
References
  • (MISC) https://github.com/typestack/class-validator#passing-options -

Information

Published : 2019-10-24 18:15

Updated : 2024-11-21 04:33


NVD link : CVE-2019-18413

Mitre link : CVE-2019-18413

CVE.ORG link : CVE-2019-18413


JSON object : View

Products Affected

typestack_class-validator_project

  • typestack_class-validator
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')