
Cloud Vulnerability DB
A community-led vulnerabilities database
A prototype pollution vulnerability was reported in UglifyJS version 3.13.2, specifically in the DEFNODE function within ast.js via the name variable. This vulnerability was assigned CVE-2022-37598. The issue was reported on October 5, 2022, and affects the UglifyJS JavaScript minifier tool (GitHub Issue).
The vulnerability was identified in the DEFNODE function implementation within the ast.js file of UglifyJS. The issue specifically relates to potential prototype pollution through the name variable in ast.js (GitHub Issue).
The vulnerability could potentially lead to prototype pollution, which is a type of attack where JavaScript's object prototype chain is manipulated to inject or modify properties that could affect all objects of that type in the application (GitHub Issue).
Since the vendor has marked this vulnerability as invalid, no official patches or mitigations have been released. The original report suggested following prototype pollution best practices as described in Snyk's documentation (GitHub Issue).
The vulnerability was initially reported through multiple channels, including Sonatype's security scanning tools, which marked it as a critical vulnerability. However, the UglifyJS maintainers have disputed the validity of the vulnerability report (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."