{ "schema_version": "1.4.0", "id": "GHSA-vpgw-ffh3-648h", "modified": "2022-04-22T20:20:55Z", "published": "2022-04-12T00:00:38Z", "aliases": [ "CVE-2022-1295" ], "summary": "Prototype Pollution in fullpage.js", "details": "fullPage utils are available to developers using window.fp_utils. They can use these utils for their own use-case (other than fullPage) as well. However, one of the utils deepExtend is vulnerable to Prototype Pollution vulnerability.\n\nJavascript is \"prototype\" language which means when a new \"object\" is created, it carries the predefined properties and methods of an \"object\" with itself like toString, constructor etc. By using prototype-pollution vulnerability, an attacker can overwrite/create the property of that \"object\" type. If the victim developer has used that property anywhere in the code, then it will have severe effect on the application.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "affected": [ { "package": { "ecosystem": "npm", "name": "fullpage.js" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "4.0.2" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1295" }, { "type": "WEB", "url": "https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48" }, { "type": "PACKAGE", "url": "https://github.com/alvarotrigo/fullpage.js" }, { "type": "WEB", "url": "https://huntr.dev/bounties/3b9d450c-24ac-4037-b04d-4d4dafbf593a" } ], "database_specific": { "cwe_ids": [ "CWE-1321" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-04-22T20:20:05Z", "nvd_published_at": "2022-04-11T12:15:00Z" } }