mootools@1.4.4 vulnerabilities

MooTools 1.5.2 Server library

Direct Vulnerabilities

Known vulnerabilities in the mootools package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Regular Expression Denial of Service (ReDoS)

mootools is an a library for web development, with support for OOP.

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the CSS selector parser. An attacker can inject a string into a CSS selector at runtime, which is quite common with e.g. jQuery CSS selectors.

Note:

The maintainer is treating this issue as a wontfix due to low impact and lack of activity on the project.

How to fix Regular Expression Denial of Service (ReDoS)?

There is no fixed version for mootools.

*
  • M
Prototype Pollution

mootools is an a library for web development, with support for OOP.

Affected versions of this package are vulnerable to Prototype Pollution. This is due to the ability to pass untrusted input to Object.merge()

PoC:

require("mootools")
Object.merge({}, JSON.parse("{"__proto__": {"vulnerable": true}}"))
console.log("Vulnerable? " + "any object".vulnerable)

How to fix Prototype Pollution?

There is no fixed version for mootools.

*