
Cloud Vulnerability DB
A community-led vulnerabilities database
@aedart/support, a support package for Ion (a monorepo for JavaScript/TypeScript packages), was found to contain a prototype pollution vulnerability (CVE-2023-30857) prior to version 0.6.1. The vulnerability was discovered in the MetadataRecord component when merged with a base class' metadata object in the meta decorator (NVD, GitHub Advisory).
The vulnerability is classified as a prototype pollution issue (CWE-1321) with a CVSS v3.1 Base Score of 3.7 (LOW). The attack vector is network-based with high attack complexity, requiring no privileges or user interaction. The scope is unchanged, with no impact on confidentiality or availability but low impact on integrity (NVD).
The impact of this vulnerability is considered low, as exploitation requires specific conditions. The vulnerability only becomes relevant when a class is decorated using the meta() decorator, and sensitive objects would need to be stored as metadata for any security impact to occur (GitHub Advisory).
The vulnerability has been patched in version 0.6.1 of @aedart/support. The fix involves using Object.create(null) instead of an empty object when creating new metadata records (GitHub Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."