vulnerability
Red Hat JBoss EAP: CVE-2019-11358: Prototype Pollution
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Mar 27, 2019 | Sep 19, 2024 | Jul 2, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Mar 27, 2019
Added
Sep 19, 2024
Modified
Jul 2, 2025
Description
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.. A Prototype Pollution vulnerability was found in jquery. Untrusted JSON passed to the `extend` function could lead to modifying objects up the prototype chain, including the global Object. A crafted JSON object passed to a vulnerable method could lead to denial of service or data injection, with various consequences.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CWE-1321
- CVE-2019-11358
- https://attackerkb.com/topics/CVE-2019-11358
- URL-https://access.redhat.com/security/cve/CVE-2019-11358
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=1701972
- URL-https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/
- URL-https://www.drupal.org/sa-core-2019-006
- URL-https://access.redhat.com/errata/RHSA-2023:0552
- URL-https://access.redhat.com/errata/RHSA-2023:0553
- URL-https://access.redhat.com/errata/RHSA-2023:0554
- URL-https://access.redhat.com/errata/RHSA-2023:0556

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.