{ "schema_version": "1.4.0", "id": "GHSA-87qp-7cw8-8q9c", "modified": "2024-03-27T21:57:36Z", "published": "2024-03-25T06:30:24Z", "withdrawn": "2024-03-27T21:57:36Z", "aliases": [], "summary": "Duplicate Advisory: web3-utils Prototype Pollution vulnerability", "details": "## Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-2g4c-8fpm-c46v. This link is maintained to preserve external references.\n\n## Original Description\nVersions of the package web3-utils before 4.2.1 are vulnerable to Prototype Pollution via the utility functions format and mergeDeep, due to insecure recursive merge.\nAn attacker can manipulate an object's prototype, potentially leading to the alteration of the behavior of all objects inheriting from the affected prototype by passing specially crafted input to these functions.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "affected": [ { "package": { "ecosystem": "npm", "name": "web3-utils" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "4.2.1" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21505" }, { "type": "WEB", "url": "https://github.com/web3/web3.js/commit/8ed041c6635d807b3da8960ad49e125e3d1b0e80" }, { "type": "PACKAGE", "url": "https://github.com/web3/web3.js" }, { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-JS-WEB3UTILS-6229337" } ], "database_specific": { "cwe_ids": [ "CWE-1321" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-03-25T19:36:43Z", "nvd_published_at": "2024-03-25T05:15:50Z" } }