Vulnerability Details CVE-2021-41097
aurelia-path is part of the Aurelia platform and contains utilities for path manipulation. There is a prototype pollution vulnerability in aurelia-path before version 1.1.7. The vulnerability exposes Aurelia application that uses `aurelia-path` package to parse a string. The majority of this will be Aurelia applications that employ the `aurelia-router` package. An example is this could allow an attacker to change the prototype of base object class `Object` by tricking an application to parse the following URL: `https://aurelia.io/blog/?__proto__[asdf]=asdf`. The problem is patched in version `1.1.7`.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 55.8%
CVSS Severity
CVSS v3 Score 9.1
CVSS v2 Score 5.0
Products affected by CVE-2021-41097
-
cpe:2.3:a:bluespire:aurelia-path:0.0.1
-
cpe:2.3:a:bluespire:aurelia-path:0.1.0
-
cpe:2.3:a:bluespire:aurelia-path:0.10.0
-
cpe:2.3:a:bluespire:aurelia-path:0.11.0
-
cpe:2.3:a:bluespire:aurelia-path:0.2.0
-
cpe:2.3:a:bluespire:aurelia-path:0.2.1
-
cpe:2.3:a:bluespire:aurelia-path:0.2.2
-
cpe:2.3:a:bluespire:aurelia-path:0.3.0
-
cpe:2.3:a:bluespire:aurelia-path:0.4.0
-
cpe:2.3:a:bluespire:aurelia-path:0.4.1
-
cpe:2.3:a:bluespire:aurelia-path:0.4.2
-
cpe:2.3:a:bluespire:aurelia-path:0.4.3
-
cpe:2.3:a:bluespire:aurelia-path:0.4.4
-
cpe:2.3:a:bluespire:aurelia-path:0.4.5
-
cpe:2.3:a:bluespire:aurelia-path:0.4.6
-
cpe:2.3:a:bluespire:aurelia-path:0.5.0
-
cpe:2.3:a:bluespire:aurelia-path:0.6.0
-
cpe:2.3:a:bluespire:aurelia-path:0.6.1
-
cpe:2.3:a:bluespire:aurelia-path:0.7.0
-
cpe:2.3:a:bluespire:aurelia-path:0.8.0
-
cpe:2.3:a:bluespire:aurelia-path:0.8.1
-
cpe:2.3:a:bluespire:aurelia-path:0.9.0
-
cpe:2.3:a:bluespire:aurelia-path:1.0.0
-
cpe:2.3:a:bluespire:aurelia-path:1.1.0
-
cpe:2.3:a:bluespire:aurelia-path:1.1.1
-
cpe:2.3:a:bluespire:aurelia-path:1.1.2
-
cpe:2.3:a:bluespire:aurelia-path:1.1.3
-
cpe:2.3:a:bluespire:aurelia-path:1.1.4
-
cpe:2.3:a:bluespire:aurelia-path:1.1.5