CVE-2022-37616

** DISPUTED ** A prototype pollution vulnerability exists in the function copy in dom.js in the xmldom (published as @xmldom/xmldom) package before 0.8.3 for Node.js via the p variable. NOTE: the vendor states "we are in the process of marking this report as invalid."
References
Link Resource
http://users.encs.concordia.ca/~mmannan/publications/JS-vulnerability-aisaccs2022.pdf Technical Description Third Party Advisory
https://dl.acm.org/doi/abs/10.1145/3488932.3497769 Technical Description Third Party Advisory
https://dl.acm.org/doi/pdf/10.1145/3488932.3497769 Third Party Advisory
https://github.com/xmldom/xmldom/blob/bc36efddf9948aba15618f85dc1addfc2ac9d7b2/lib/dom.js#L1 Patch Third Party Advisory
https://github.com/xmldom/xmldom/blob/bc36efddf9948aba15618f85dc1addfc2ac9d7b2/lib/dom.js#L3 Patch Third Party Advisory
https://github.com/xmldom/xmldom/issues/436 Issue Tracking Patch Third Party Advisory
https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826 Issue Tracking Third Party Advisory
https://github.com/xmldom/xmldom/issues/436#issuecomment-1327776560 Issue Tracking Third Party Advisory
https://github.com/xmldom/xmldom/security/advisories/GHSA-9pgh-qqpf-7wqj Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/10/msg00023.html Mailing List Third Party Advisory
http://users.encs.concordia.ca/~mmannan/publications/JS-vulnerability-aisaccs2022.pdf Technical Description Third Party Advisory
https://dl.acm.org/doi/abs/10.1145/3488932.3497769 Technical Description Third Party Advisory
https://dl.acm.org/doi/pdf/10.1145/3488932.3497769 Third Party Advisory
https://github.com/xmldom/xmldom/blob/bc36efddf9948aba15618f85dc1addfc2ac9d7b2/lib/dom.js#L1 Patch Third Party Advisory
https://github.com/xmldom/xmldom/blob/bc36efddf9948aba15618f85dc1addfc2ac9d7b2/lib/dom.js#L3 Patch Third Party Advisory
https://github.com/xmldom/xmldom/issues/436 Issue Tracking Patch Third Party Advisory
https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826 Issue Tracking Third Party Advisory
https://github.com/xmldom/xmldom/issues/436#issuecomment-1327776560 Issue Tracking Third Party Advisory
https://github.com/xmldom/xmldom/security/advisories/GHSA-9pgh-qqpf-7wqj Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/10/msg00023.html Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xmldom_project:xmldom:*:*:*:*:*:node.js:*:*
cpe:2.3:a:xmldom_project:xmldom:*:*:*:*:*:node.js:*:*
cpe:2.3:a:xmldom_project:xmldom:*:*:*:*:*:node.js:*:*
cpe:2.3:a:xmldom_project:xmldom:0.9.0:beta1:*:*:*:node.js:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:15

Type Values Removed Values Added
References () http://users.encs.concordia.ca/~mmannan/publications/JS-vulnerability-aisaccs2022.pdf - Technical Description, Third Party Advisory () http://users.encs.concordia.ca/~mmannan/publications/JS-vulnerability-aisaccs2022.pdf - Technical Description, Third Party Advisory
References () https://dl.acm.org/doi/abs/10.1145/3488932.3497769 - Technical Description, Third Party Advisory () https://dl.acm.org/doi/abs/10.1145/3488932.3497769 - Technical Description, Third Party Advisory
References () https://dl.acm.org/doi/pdf/10.1145/3488932.3497769 - Third Party Advisory () https://dl.acm.org/doi/pdf/10.1145/3488932.3497769 - Third Party Advisory
References () https://github.com/xmldom/xmldom/blob/bc36efddf9948aba15618f85dc1addfc2ac9d7b2/lib/dom.js#L1 - Patch, Third Party Advisory () https://github.com/xmldom/xmldom/blob/bc36efddf9948aba15618f85dc1addfc2ac9d7b2/lib/dom.js#L1 - Patch, Third Party Advisory
References () https://github.com/xmldom/xmldom/blob/bc36efddf9948aba15618f85dc1addfc2ac9d7b2/lib/dom.js#L3 - Patch, Third Party Advisory () https://github.com/xmldom/xmldom/blob/bc36efddf9948aba15618f85dc1addfc2ac9d7b2/lib/dom.js#L3 - Patch, Third Party Advisory
References () https://github.com/xmldom/xmldom/issues/436 - Issue Tracking, Patch, Third Party Advisory () https://github.com/xmldom/xmldom/issues/436 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826 - Issue Tracking, Third Party Advisory () https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826 - Issue Tracking, Third Party Advisory
References () https://github.com/xmldom/xmldom/issues/436#issuecomment-1327776560 - Issue Tracking, Third Party Advisory () https://github.com/xmldom/xmldom/issues/436#issuecomment-1327776560 - Issue Tracking, Third Party Advisory
References () https://github.com/xmldom/xmldom/security/advisories/GHSA-9pgh-qqpf-7wqj - Third Party Advisory () https://github.com/xmldom/xmldom/security/advisories/GHSA-9pgh-qqpf-7wqj - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/10/msg00023.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/10/msg00023.html - Mailing List, Third Party Advisory

08 Nov 2022, 22:15

Type Values Removed Values Added
Summary A prototype pollution vulnerability exists in the function copy in dom.js in the xmldom (published as @xmldom/xmldom) package before 0.8.3 for Node.js via the p variable. ** DISPUTED ** A prototype pollution vulnerability exists in the function copy in dom.js in the xmldom (published as @xmldom/xmldom) package before 0.8.3 for Node.js via the p variable. NOTE: the vendor states "we are in the process of marking this report as invalid."

27 Oct 2022, 14:48

Type Values Removed Values Added
CPE cpe:2.3:a:xmldom_project:xmldom:0.9.0:beta1:*:*:*:node.js:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
References (MLIST) https://lists.debian.org/debian-lts-announce/2022/10/msg00023.html - (MLIST) https://lists.debian.org/debian-lts-announce/2022/10/msg00023.html - Third Party Advisory
References (MISC) https://github.com/xmldom/xmldom/security/advisories/GHSA-9pgh-qqpf-7wqj - (MISC) https://github.com/xmldom/xmldom/security/advisories/GHSA-9pgh-qqpf-7wqj - Third Party Advisory

18 Oct 2022, 17:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/10/msg00023.html -

12 Oct 2022, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-10-11 05:15

Updated : 2024-11-21 07:15


NVD link : CVE-2022-37616

Mitre link : CVE-2022-37616

CVE.ORG link : CVE-2022-37616


JSON object : View

Products Affected

debian

  • debian_linux

xmldom_project

  • xmldom
CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')