GHSA-vh95-rmgr-6w4m
MODERATE
Prototype Pollution in minimist
Published April 3, 2020Updated January 14, 2025Source: osv
Details
Affected versions of `minimist` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects.
Parsing the argument `--__proto__.y=Polluted` adds a `y` property with value `Polluted` to all objects. The argument `--__proto__=Polluted` raises and uncaught error and crashes the application.
This is exploitable if attackers have control over the arguments being passed to `minimist`.
## Recommendation
Upgrade to versions 0.2.1, 1.2.3 or later.
Remediation
Upgrade to the fixed version using your package manager.
npm
Update minimist to 1.2.3 or laternpm install minimist@1.2.3
npm
Update minimist to 0.2.1 or laternpm install minimist@0.2.1
After upgrading, run your dependency scanner again to confirm the vulnerability is resolved.
Affected Packages (2)
Vulnerability Classification
Common Weakness Enumeration (CWE) identifiers for this vulnerability type.
- CWE-1321Prototype PollutionMITRE
CVSS Score Breakdown
What the CVSS (Common Vulnerability Scoring System) 3.1 score means for each attack dimension.
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
References
- https://nvd.nist.gov/vuln/detail/CVE-2020-7598ADVISORY
- https://github.com/minimistjs/minimist/commit/10bd4cdf49d9686d48214be9d579a9cdfda37c68WEB
- https://github.com/minimistjs/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9abWEB
- https://github.com/minimistjs/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95WEB
- https://github.com/minimistjs/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94WEB
- https://github.com/substack/minimistPACKAGE
- https://snyk.io/vuln/SNYK-JS-MINIMIST-559764WEB
- https://www.npmjs.com/advisories/1179WEB
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.htmlWEB
Risk Assessment
CVSS Score
3.1
Exploitation is difficult or impact is minor. Address in your next planned update.
EPSS Score (30-day exploit probability)
0.25%
Higher than 48% of vulnerabilities
Also Known As
Check if you're affected
Scan your dependencies to see if this vulnerability affects your projects.
Scan Your Dependencies