signalk-server is vulnerable to Prototype Pollution
71
High Risk
Affected versions of this package are vulnerable to prototype pollution via the applicationData API, where unvalidated, user-controlled paths passed to _.set() and JSON Patch operations could include dangerous segments like __proto__, constructor, or prototype, allowing an attacker to manipulate the object prototype and potentially alter application behaviour or gain unauthorized access; the issue is fixed by adding validation to block such prototype pollution paths and returning a 400 response when they are detected, preventing exploitation.
You are affected if you are using a version that falls within the vulnerable range.
signalk-server is vulnerable to Prototype Pollution in versions 1.27.0 - 2.19.1.
Upgrade the signalk-server library to a patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant