{"api_version":"1","generated_at":"2026-05-13T03:12:34+00:00","cve":"CVE-2020-5259","urls":{"html":"https://cve.report/CVE-2020-5259","api":"https://cve.report/api/cve/CVE-2020-5259.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-5259","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-5259"},"summary":{"title":"CVE-2020-5259","description":"In affected versions of dojox (NPM package), the jqMix method is vulnerable to Prototype Pollution. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values. This has been patched in versions 1.11.10, 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2020-03-10 18:15:00","updated_at":"2020-03-11 21:15:00"},"problem_types":["CWE-74"],"metrics":[],"references":[{"url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html","name":"[debian-lts-announce] 20200311 [SECURITY] [DLA 2139-1] dojo security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2139-1] dojo security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da","name":"https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da","refsource":"MISC","tags":["Patch"],"title":"Merge pull request from GHSA-3hw5-q855-g6cw · dojo/dojox@47d1b30 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/dojo/dojox/security/advisories/GHSA-3hw5-q855-g6cw","name":"https://github.com/dojo/dojox/security/advisories/GHSA-3hw5-q855-g6cw","refsource":"CONFIRM","tags":["Exploit","Third Party Advisory"],"title":"Prototype Pollution · Advisory · dojo/dojox · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-5259","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5259","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"5259","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linuxfoundation","cpe5":"dojox","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"node.js","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5259","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linuxfoundation","cpe5":"dojox","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"node.js","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-5259","qid":"982945","title":"Nodejs (npm) Security Update for dojox (GHSA-3hw5-q855-g6cw)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2020-5259","STATE":"PUBLIC","TITLE":"Prototype Pollution in Dojox"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"dojox","version":{"version_data":[{"version_value":"< 1.11.10"},{"version_value":">= 1.12.0, < 1.12.8"},{"version_value":">= 1.13.0, < 1.13.7"},{"version_value":">= 1.14.0, < 1.14.6"},{"version_value":">= 1.15.0, < 1.15.3"},{"version_value":">= 1.16.0, < 1.16.2"}]}}]},"vendor_name":"dojo"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In affected versions of dojox (NPM package), the jqMix method is vulnerable to Prototype Pollution. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values. This has been patched in versions 1.11.10, 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2"}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-94: Improper Control of Generation of Code ('Code Injection')"}]}]},"references":{"reference_data":[{"name":"https://github.com/dojo/dojox/security/advisories/GHSA-3hw5-q855-g6cw","refsource":"CONFIRM","url":"https://github.com/dojo/dojox/security/advisories/GHSA-3hw5-q855-g6cw"},{"name":"https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da","refsource":"MISC","url":"https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da"},{"refsource":"MLIST","name":"[debian-lts-announce] 20200311 [SECURITY] [DLA 2139-1] dojo security update","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html"}]},"source":{"advisory":"GHSA-3hw5-q855-g6cw","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2020-03-10 18:15:00","lastModifiedDate":"2020-03-11 21:15:00","problem_types":["CWE-74"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":8.6,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linuxfoundation:dojox:*:*:*:*:*:node.js:*:*","versionEndExcluding":"1.11.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linuxfoundation:dojox:*:*:*:*:*:node.js:*:*","versionStartIncluding":"1.12.0","versionEndExcluding":"1.12.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linuxfoundation:dojox:*:*:*:*:*:node.js:*:*","versionStartIncluding":"1.13.0","versionEndExcluding":"1.13.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linuxfoundation:dojox:*:*:*:*:*:node.js:*:*","versionStartIncluding":"1.14.0","versionEndExcluding":"1.14.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linuxfoundation:dojox:*:*:*:*:*:node.js:*:*","versionStartIncluding":"1.15.0","versionEndExcluding":"1.15.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linuxfoundation:dojox:*:*:*:*:*:node.js:*:*","versionStartIncluding":"1.16.0","versionEndExcluding":"1.16.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"5259","Ordinal":"165473","Title":"CVE-2020-5259","CVE":"CVE-2020-5259","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"5259","Ordinal":"1","NoteData":"In affected versions of dojox (NPM package), the jqMix method is vulnerable to Prototype Pollution. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values. This has been patched in versions 1.11.10, 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2","Type":"Description","Title":null},{"CveYear":"2020","CveId":"5259","Ordinal":"2","NoteData":"2020-03-10","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"5259","Ordinal":"3","NoteData":"2020-03-11","Type":"Other","Title":"Modified"}]}}}