• Published Date: Fri 13 May 2022
  • Last Modified Date: Fri 13 May 2022

This affects the package convict before 6.2.3. This is a bypass of [CVE-2022-22143]( The [fix]( introduced, relies on the startsWith method and does not prevent the vulnerability: before splitting the path, it checks if it starts with __proto__ or this.constructor.prototype. To bypass this check it's possible to prepend the dangerous paths with any string value followed by a dot, like for example foo.__proto__ or foo.this.constructor.prototype.

References (Advisories, Solutions, and Tools):

Note: This page is generated by our securitybot and has not been checked for errors. Feed Source: NVD