CVE-2020-7788
Summary
| CVE | CVE-2020-7788 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-12-11 11:15:00 UTC |
| Updated | 2022-12-02 19:40:00 UTC |
| Description | This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context. |
Risk And Classification
Problem Types: CWE-1321
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 9.0 | All | All | All |
| Operating System | Debian | Debian Linux | 9.0 | All | All | All |
| Application | Ini Project | Ini | All | All | All | All |
| Application | Ini Project | Ini | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [SECURITY] [DLA 2503-1] node-ini security update | MLIST | lists.debian.org | Mailing List, Third Party Advisory |
| Prototype Pollution in ini | Snyk | MISC | snyk.io | Exploit, Third Party Advisory |
| do not allow invalid hazardous string as section name · npm/ini@56d2805 · GitHub | MISC | github.com | Patch, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Eugene Lim
LEGACY: Government Technology Agency Cyber Security Group
Legacy QID Mappings
- 159554 Oracle Enterprise Linux Security Update for nodejs:16 (ELSA-2021-5171)
- 159622 Oracle Enterprise Linux Security Update for nodejs:14 (ELSA-2022-0350)
- 160111 Oracle Enterprise Linux Security Update for nodejs and nodejs-nodemon (ELSA-2022-6595)
- 239590 Red Hat Update for rh-nodejs12-nodejs and rh-nodejs12-nodejs-nodemon (RHSA-2021:3281)
- 239591 Red Hat Update for rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon (RHSA-2021:3280)
- 239970 Red Hat Update for nodejs:16 security (RHSA-2021:5171)
- 240037 Red Hat Update for nodejs:14 security (RHSA-2022:0246)
- 240051 Red Hat Update for nodejs:14 security (RHSA-2022:0350)
- 240676 Red Hat Update for nodejs and nodejs-nodemon (RHSA-2022:6595)
- 377388 Alibaba Cloud Linux Security Update for nodejs:14 (ALINUX3-SA-2021:0016)
- 377422 Alibaba Cloud Linux Security Update for nodejs:14 (ALINUX3-SA-2022:0014)
- 940231 AlmaLinux Security Update for nodejs:10 (ALSA-2021:0548)
- 940253 AlmaLinux Security Update for nodejs:12 (ALSA-2021:0549)
- 940254 AlmaLinux Security Update for nodejs:14 (ALSA-2021:0551)
- 940355 AlmaLinux Security Update for nodejs:16 (ALSA-2021:5171)
- 940448 AlmaLinux Security Update for nodejs:14 (ALSA-2022:0350)
- 940678 AlmaLinux Security Update for nodejs and nodejs-nodemon (ALSA-2022:6595)
- 960322 Rocky Linux Security Update for nodejs:16 (RLSA-2021:5171)
- 960531 Rocky Linux Security Update for nodejs and nodejs-nodemon (RLSA-2022:6595)
- 960749 Rocky Linux Security Update for nodejs:14 (RLSA-2021:0551)
- 960803 Rocky Linux Security Update for nodejs:12 (RLSA-2021:0549)
- 960843 Rocky Linux Security Update for nodejs:10 (RLSA-2021:0548)
- 960863 Rocky Linux Security Update for nodejs:14 (RLSA-2022:0350)
- 983801 Nodejs (npm) Security Update for ini (GHSA-qqgx-2p2h-9c37)