
Cloud Vulnerability DB
A community-led vulnerabilities database
A Prototype Pollution vulnerability was discovered in GitHub repository mastodon/mastodon prior to version 3.5.0, identified as CVE-2022-0432. The vulnerability was discovered and disclosed on January 31, 2022 (CVE List).
The vulnerability existed in the embed.js file of the Mastodon codebase where insufficient validation of message data allowed for potential prototype pollution through the data.id parameter. The fix involved adding additional origin validation checks and explicitly preventing the use of 'proto' as an ID (GitHub Commit).
Prototype Pollution vulnerabilities can allow attackers to modify JavaScript object behavior, potentially leading to application security bypasses or denial of service conditions (Huntr Report).
The vulnerability was fixed in Mastodon version 3.5.0. Users should upgrade to this version or later to receive the security patch. The fix includes additional validation checks for message origins and prevents the use of 'proto' as an ID value (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."