CVE-2021-43852

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-43852
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-43852.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-43852
Aliases
Published
2022-01-04T20:15:07Z
Modified
2024-05-30T03:17:51.693473Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

OroPlatform is a PHP Business Application Platform. In affected versions by sending a specially crafted request, an attacker could inject properties into existing JavaScript language construct prototypes, such as objects. Later this injection may lead to JS code execution by libraries that are vulnerable to Prototype Pollution. This issue has been patched in version 4.2.8. Users unable to upgrade may configure a firewall to drop requests containing next strings: __proto__ , constructor[prototype], and constructor.prototype to mitigate this issue.

References

Affected packages

Git / github.com/oroinc/platform

Affected ranges

Type
GIT
Repo
https://github.com/oroinc/platform
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.0.0
1.0.0-RC1
1.0.0-alpha2
1.0.0-alpha3
1.0.0-alpha4
1.0.0-alpha5
1.0.0-alpha6
1.0.0-beta1
1.0.0-beta2
1.0.0-beta3
1.0.0-beta4
1.0.0-beta5
1.0.0-rc1
1.0.0-rc2
1.0.0-rc3
1.1.0
1.10.0-alpha1
1.10.0-beta.2
1.10.0-beta.3
1.10.0-sp74
1.10.10-beta.5
1.4.0-rc1
1.5.0
1.7.0
1.8.0
1.9.0-RC1

2.*

2.0.0
2.0.0-beta.1

3.*

3.1.0-beta

4.*

4.1.0-rc4

5.*

5.0.0-alpha.1