Bug 2041833 (CVE-2021-23436) - CVE-2021-23436 immer: type confusion vulnerability can lead to a bypass of CVE-2020-28477
Summary: CVE-2021-23436 immer: type confusion vulnerability can lead to a bypass of CV...
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2021-23436
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2041834
TreeView+ depends on / blocked
 
Reported: 2022-01-18 11:00 UTC by Dhananjay Arunesh
Modified: 2024-02-06 04:33 UTC (History)
16 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A prototype pollution flaw was found in the Node.js immer module. By adding or modifying properties of Object.prototype using a __proto__ or constructor payload, an attacker could execute arbitrary code on the system.
Clone Of:
Environment:
Last Closed: 2023-05-03 17:43:05 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:6813 0 None None None 2022-10-05 10:45:11 UTC

Description Dhananjay Arunesh 2022-01-18 11:00:46 UTC
This affects the package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition (p === "__proto__" || p === "constructor") in applyPatches_ returns false if p is ['__proto__'] (or ['constructor']). The === operator (strict equality operator) returns false if the operands have different type.

References:
https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237

Comment 5 errata-xmlrpc 2022-10-05 10:45:08 UTC
This issue has been addressed in the following products:

  RHPAM 7.13.1 async

Via RHSA-2022:6813 https://access.redhat.com/errata/RHSA-2022:6813

Comment 8 Product Security DevOps Team 2023-05-03 17:43:02 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-23436


Note You need to log in before you can comment on or make changes to this bug.