CVE-2022-37601
high-risk
Published 2022-10-12
Prototype pollution vulnerability in function parseQuery in parseQuery.js in webpack loader-utils via the name variable in parseQuery.js. This affects all versions prior to 1.4.1 and 2.0.3.
Do I need to act?
!
20.1% chance of exploitation in next 30 days
EPSS score — higher than 80% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (2)
Affected Vendors
References (18)
Technical Description
http://users.encs.concordia.ca/~mmannan/publications/JS-vulnerability-aisaccs202...
Technical Description
https://dl.acm.org/doi/abs/10.1145/3488932.3497769
Technical Description
https://dl.acm.org/doi/pdf/10.1145/3488932.3497769
Issue Tracking
https://github.com/webpack/loader-utils/issues/212
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/12/msg00044.html
Technical Description
http://users.encs.concordia.ca/~mmannan/publications/JS-vulnerability-aisaccs202...
Technical Description
https://dl.acm.org/doi/abs/10.1145/3488932.3497769
Technical Description
https://dl.acm.org/doi/pdf/10.1145/3488932.3497769
Issue Tracking
https://github.com/webpack/loader-utils/issues/212
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/12/msg00044.html
53
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
14/34 · Moderate
Exposure
7/34 · Low