
Cloud Vulnerability DB
A community-led vulnerabilities database
A prototype pollution vulnerability was discovered in mockery.js, specifically in the enable function in commit 822f0566fd6d72af8c943ae5ca2aa92e516aa2cf. The vulnerability was assigned CVE-2022-37614 and was disclosed on October 10, 2022. The affected component is the mfncooper mockery library (GitHub Issue).
The vulnerability exists in the enable function within mockery.js, where improper handling of the key variable can lead to prototype pollution. This occurs when merging options with default settings, potentially allowing an attacker to modify the prototype chain of objects (GitHub Source).
Prototype pollution vulnerabilities can allow attackers to modify the behavior of all objects inheriting from the affected prototype. This could potentially lead to application-wide security issues, including denial of service (DoS) or, in some cases, remote code execution depending on how the polluted properties are used within the application (NVD).
The vulnerability can be mitigated by implementing proper input validation and using prototype pollution prevention techniques as described in security best practices. This includes checking for and blocking dangerous properties like 'proto', 'constructor', and 'prototype' (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."