Description
All versions of package querymen are vulnerable to Prototype Pollution if the parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. Note: This vulnerability derives from an incomplete fix of [CVE-2020-7600](https://security.snyk.io/vuln/SNYK-JS-QUERYMEN-559867).
References
https://snyk.io/vuln/SNYK-JS-QUERYMEN-2391488
ExploitThird Party Advisory
https://snyk.io/vuln/SNYK-JS-QUERYMEN-2391488
ExploitThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
5.9 · Medium
Information
Source identifier
Vulnerability status
Modified
Published
2022-06-17T18:15:10.670Z
3 years agoLast modified
2024-11-21T05:53:08.677Z
1 year ago