This affects the package js-ini before 1.3.0. If an attacker submits a malicious INI file to an application that parses it with parse , they will pollute the prototype on the application. This can be exploited further depending on the context. https://security.snyk.io/vuln/SNYK-JS-JSINI-1048970 https://github.com/Sdju/js-ini/commit/fa17efb7e3a7c9464508a254838d4c231784931e
Created nodejs-ini tracking bugs for this issue: Affects: epel-7 [bug 2127076]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.