Conform 在“parseWith...”函数中包含原型污染漏洞 (CVE-2024-32866)

CVE编号

CVE-2024-32866

利用情况

暂无

补丁情况

N/A

披露时间

2024-04-24
漏洞描述
Conform, a type-safe form validation library, allows the parsing of nested objects in the form of `object.property`. Due to an improper implementation of this feature in versions prior to 1.1.1, an attacker can exploit the feature to trigger prototype pollution by passing a crafted input to `parseWith...` functions. Applications that use conform for server-side validation of form data or URL parameters are affected by this vulnerability. Version 1.1.1 contains a patch for the issue.

解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
CVSS3评分
8.6
  • 攻击路径
    网络
  • 攻击复杂度
  • 权限要求
  • 影响范围
    未更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
阿里云安全产品覆盖情况