pino is vulnerable to Prototype Pollution
46
Medium Risk
Affected versions of the package are vulnerable to prototype pollution issues in the transport loading mechanism due to unsafe access to globalThis.__bundlerPathsOverrides. The use of the in operator and a default {} object allows prototype chain manipulation, which can influence transport resolution logic. This can be abused by an attacker to alter application behavior. The fix hardens the implementation by using Object.prototype.hasOwnProperty.call() and a prototype-less fallback object to prevent prototype chain pollution.
You are affected if you are using a version that falls within the vulnerable range.
pino is vulnerable to Prototype Pollution in versions 7.2.0 - 10.1.0.
Upgrade the pino library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant