CVE-2021-4307

A vulnerability was found in Yomguithereal Baobab up to 2.6.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be launched remotely. Upgrading to version 2.6.1 is able to address this issue. The patch is named c56639532a923d9a1600fb863ec7551b188b5d19. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217627.
Configurations

Configuration 1 (hide)

cpe:2.3:a:baobab_project:baobab:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:37

Type Values Removed Values Added
CVSS v2 : 6.5
v3 : 9.8
v2 : 6.5
v3 : 6.3
References () https://github.com/Yomguithereal/baobab/commit/c56639532a923d9a1600fb863ec7551b188b5d19 - Patch () https://github.com/Yomguithereal/baobab/commit/c56639532a923d9a1600fb863ec7551b188b5d19 - Patch
References () https://github.com/Yomguithereal/baobab/pull/511 - Exploit, Patch, Third Party Advisory () https://github.com/Yomguithereal/baobab/pull/511 - Exploit, Patch, Third Party Advisory
References () https://github.com/Yomguithereal/baobab/releases/tag/2.6.1 - Release Notes () https://github.com/Yomguithereal/baobab/releases/tag/2.6.1 - Release Notes
References () https://vuldb.com/?ctiid.217627 - Third Party Advisory, VDB Entry () https://vuldb.com/?ctiid.217627 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.217627 - Third Party Advisory, VDB Entry () https://vuldb.com/?id.217627 - Third Party Advisory, VDB Entry

11 Apr 2024, 01:13

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en Yomguithereal Baobab hasta 2.6.0. Ha sido declarada como crítica. Una funcionalidad desconocida es afectada por esta vulnerabilidad. La manipulación conduce a una modificación controlada inadecuadamente de los atributos del prototipo del objeto ("contaminación del prototipo"). El ataque se puede lanzar de forma remota. La actualización a la versión 2.6.1 puede solucionar este problema. El parche se llama c56639532a923d9a1600fb863ec7551b188b5d19. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-217627.

08 Dec 2023, 01:32

Type Values Removed Values Added
New CVE

Information

Published : 2023-01-07 20:15

Updated : 2024-11-21 06:37


NVD link : CVE-2021-4307

Mitre link : CVE-2021-4307

CVE.ORG link : CVE-2021-4307


JSON object : View

Products Affected

baobab_project

  • baobab
CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')