mootools@1.3.1-1 vulnerabilities

MooTools 1.5.2 Server library

Direct Vulnerabilities

Known vulnerabilities in the mootools package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Regular Expression Denial of Service (ReDoS)

mootools is an a library for web development, with support for OOP.

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the CSS selector parser. An attacker can inject a string into a CSS selector at runtime, which is quite common with e.g. jQuery CSS selectors.

Note:

The maintainer is treating this issue as a wontfix due to low impact and lack of activity on the project.

How to fix Regular Expression Denial of Service (ReDoS)?

There is no fixed version for mootools.

*
  • M
Prototype Pollution

mootools is an a library for web development, with support for OOP.

Affected versions of this package are vulnerable to Prototype Pollution. This is due to the ability to pass untrusted input to Object.merge()

PoC:

require("mootools")
Object.merge({}, JSON.parse("{"__proto__": {"vulnerable": true}}"))
console.log("Vulnerable? " + "any object".vulnerable)

How to fix Prototype Pollution?

There is no fixed version for mootools.

*