This affects the package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition (p === "proto" || p === "constructor") in applyPatches_ returns false if p is ['proto'] (or ['constructor']). The === operator (strict equality operator) returns false if the operands have different type.
HIGH Vulnerable Package issue exists @ immer in branch main
Description
This affects the package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition (p === "proto" || p === "constructor") in applyPatches_ returns false if p is ['proto'] (or ['constructor']). The === operator (strict equality operator) returns false if the operands have different type.
HIGH Vulnerable Package issue exists @ immer in branch main
Vulnerability ID: CVE-2021-23436
Package Name: immer
Severity: HIGH
CVSS Score: 9.8
Publish Date: 2021-09-01T18:15:00
Current Package Version: 8.0.1
Remediation Upgrade Recommendation: 9.0.6
Link To SCA
Reference – NVD link