Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-36618 : Security Advisory and Response

Learn about CVE-2020-36618, a critical vulnerability in Furqan node-whois allowing remote attacks via prototype pollution. Find mitigation steps and patch details.

This CVE record pertains to a critical vulnerability found in Furqan node-whois related to prototype pollution in the index.coffee file.

Understanding CVE-2020-36618

This vulnerability allows for remote attacks due to improperly controlled modification of object prototype attributes.

What is CVE-2020-36618?

The vulnerability in Furqan node-whois allows for unauthorized manipulation of object prototype attributes, leading to potential remote attacks.

The Impact of CVE-2020-36618

The impact of this vulnerability is classified as critical, with a CVSS base score of 6.3 (Medium severity).

Technical Details of CVE-2020-36618

This section provides detailed technical information about the vulnerability.

Vulnerability Description

The vulnerability involves prototype pollution in the index.coffee file of Furqan node-whois, allowing for unauthorized modification of object prototype attributes.

Affected Systems and Versions

        Vendor: Furqan
        Product: node-whois
        Affected Version: n/a

Exploitation Mechanism

        Attack Vector: Network
        Attack Complexity: Low
        Privileges Required: Low
        User Interaction: None
        Scope: Unchanged
        Confidentiality Impact: Low
        Integrity Impact: Low
        Availability Impact: Low

Mitigation and Prevention

Steps to address and prevent the CVE-2020-36618 vulnerability.

Immediate Steps to Take

        Apply the provided patch (46ccc2aee8d063c7b6b4dee2c2834113b7286076) to fix the issue.

Long-Term Security Practices

        Regularly update and patch software to prevent vulnerabilities.
        Implement security best practices to mitigate the risk of similar attacks.

Patching and Updates

Ensure timely application of patches and updates to maintain system security.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now