
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2022-42743) affects deep-parse-json version 1.0.2, discovered and disclosed on October 19, 2022. This vulnerability allows external attackers to edit or add new properties to an object through prototype pollution, as the application fails to properly validate incoming JSON keys (Fluid Advisory).
The vulnerability is classified as a Prototype Pollution issue with a CVSSv3.1 Base Score of 7.3 (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). The core issue lies in the application's failure to validate incoming JSON keys properly, which allows manipulation of the 'proto' property. When JavaScript checks for a method/attribute in an object, it first looks in the object itself, then in the object's prototype. By successfully injecting the 'proto' property, an attacker can modify or add properties to the object (Fluid Advisory).
The vulnerability enables attackers to modify or add new properties to objects through prototype pollution, potentially leading to security bypasses and privilege escalation scenarios. The impact is demonstrated through the ability to bypass role-based access controls and elevate privileges (Fluid Advisory).
As of the initial disclosure, no official patch was available for this vulnerability (Fluid Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."