Vulnerability Details CVE-2021-23434
This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operator returns always false when the type of the operands is different.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 20.3%
CVSS Severity
CVSS v3 Score 5.6
CVSS v2 Score 7.5
Products affected by CVE-2021-23434
-
cpe:2.3:a:object-path_project:object-path:0.0.1
-
cpe:2.3:a:object-path_project:object-path:0.1.0
-
cpe:2.3:a:object-path_project:object-path:0.1.2
-
cpe:2.3:a:object-path_project:object-path:0.1.3
-
cpe:2.3:a:object-path_project:object-path:0.10.0
-
cpe:2.3:a:object-path_project:object-path:0.11.0
-
cpe:2.3:a:object-path_project:object-path:0.11.1
-
cpe:2.3:a:object-path_project:object-path:0.11.2
-
cpe:2.3:a:object-path_project:object-path:0.11.3
-
cpe:2.3:a:object-path_project:object-path:0.11.4
-
cpe:2.3:a:object-path_project:object-path:0.11.5
-
cpe:2.3:a:object-path_project:object-path:0.2.0
-
cpe:2.3:a:object-path_project:object-path:0.2.1
-
cpe:2.3:a:object-path_project:object-path:0.3.0
-
cpe:2.3:a:object-path_project:object-path:0.4.0
-
cpe:2.3:a:object-path_project:object-path:0.5.0
-
cpe:2.3:a:object-path_project:object-path:0.5.1
-
cpe:2.3:a:object-path_project:object-path:0.6.0
-
cpe:2.3:a:object-path_project:object-path:0.7.0
-
cpe:2.3:a:object-path_project:object-path:0.8.0
-
cpe:2.3:a:object-path_project:object-path:0.8.1
-
cpe:2.3:a:object-path_project:object-path:0.9.0
-
cpe:2.3:a:object-path_project:object-path:0.9.1
-
cpe:2.3:a:object-path_project:object-path:0.9.2
-
cpe:2.3:a:object-path_project:object-path:0.9.3
-
cpe:2.3:o:debian:debian_linux:10.0