// For flags

CVE-2020-5259

Prototype Pollution in Dojox

Severity Score

8.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In affected versions of dojox (NPM package), the jqMix method is vulnerable to Prototype Pollution. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values. This has been patched in versions 1.11.10, 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2

En las versiones afectadas de dojox (paquete NPM), el método jqMix es vulnerable a una Contaminación de Prototipo. La Contaminación de Prototipo se refiere a la capacidad de inyectar propiedades en prototipos de construcciones de lenguaje JavaScript existentes, tales como objetos. Un atacante manipula estos atributos para sobrescribir o contaminar un prototipo de objeto de la aplicación JavaScript del objeto base mediante la inyección de otros valores. Esto ha sido parcheado en las versiones 1.11.10, 1.12.8, 1.13.7, 1.14.6, 1.15.3 y 1.16.2

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-01-02 CVE Reserved
  • 2020-03-10 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linuxfoundation
Search vendor "Linuxfoundation"
Dojox
Search vendor "Linuxfoundation" for product "Dojox"
< 1.11.10
Search vendor "Linuxfoundation" for product "Dojox" and version " < 1.11.10"
node.js
Affected
Linuxfoundation
Search vendor "Linuxfoundation"
Dojox
Search vendor "Linuxfoundation" for product "Dojox"
>= 1.12.0 < 1.12.8
Search vendor "Linuxfoundation" for product "Dojox" and version " >= 1.12.0 < 1.12.8"
node.js
Affected
Linuxfoundation
Search vendor "Linuxfoundation"
Dojox
Search vendor "Linuxfoundation" for product "Dojox"
>= 1.13.0 < 1.13.7
Search vendor "Linuxfoundation" for product "Dojox" and version " >= 1.13.0 < 1.13.7"
node.js
Affected
Linuxfoundation
Search vendor "Linuxfoundation"
Dojox
Search vendor "Linuxfoundation" for product "Dojox"
>= 1.14.0 < 1.14.6
Search vendor "Linuxfoundation" for product "Dojox" and version " >= 1.14.0 < 1.14.6"
node.js
Affected
Linuxfoundation
Search vendor "Linuxfoundation"
Dojox
Search vendor "Linuxfoundation" for product "Dojox"
>= 1.15.0 < 1.15.3
Search vendor "Linuxfoundation" for product "Dojox" and version " >= 1.15.0 < 1.15.3"
node.js
Affected
Linuxfoundation
Search vendor "Linuxfoundation"
Dojox
Search vendor "Linuxfoundation" for product "Dojox"
>= 1.16.0 < 1.16.2
Search vendor "Linuxfoundation" for product "Dojox" and version " >= 1.16.0 < 1.16.2"
node.js
Affected