Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36575: n/a

0
Critical
VulnerabilityCVE-2024-36575cvecve-2024-36575
Published: Mon Jun 17 2024 (06/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A Prototype Pollution issue in getsetprop 1.1.0 allows an attacker to execute arbitrary code via global.accessor.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:28:37 UTC

Technical Analysis

CVE-2024-36575 is a critical security vulnerability classified as Prototype Pollution found in the getsetprop JavaScript library version 1.1.0. Prototype Pollution occurs when an attacker can manipulate the prototype of a base object, thereby altering the behavior of all objects inheriting from it. In this case, the vulnerability arises through the global.accessor property, which can be exploited to inject malicious code. This flaw allows an attacker to execute arbitrary code remotely without any authentication or user interaction, making it highly dangerous. The vulnerability is linked to CWE-94, which corresponds to improper control of code generation, indicating that the injected code can be executed in the context of the vulnerable application. The CVSS 3.1 score of 9.8 reflects the vulnerability's high exploitability (network vector, low attack complexity) and severe impact on confidentiality, integrity, and availability. Although no public patches or known exploits are currently available, the threat is imminent due to the widespread use of JavaScript libraries in web applications. Attackers exploiting this vulnerability could gain full control over affected systems, leading to data breaches, service disruption, or further lateral movement within networks.

Potential Impact

The impact of CVE-2024-36575 is severe for organizations worldwide, especially those relying on getsetprop 1.1.0 within their web applications or backend services. Successful exploitation can lead to arbitrary code execution, resulting in complete system compromise. This can cause unauthorized data access, data modification or deletion, and disruption of service availability. Attackers could deploy malware, ransomware, or use compromised systems as pivot points for further attacks within corporate networks. The vulnerability's network accessibility and lack of required privileges or user interaction increase the risk of widespread exploitation. Organizations in sectors handling sensitive data such as finance, healthcare, government, and critical infrastructure face heightened risks. Additionally, supply chain attacks could leverage this vulnerability to compromise downstream software products and services.

Mitigation Recommendations

To mitigate CVE-2024-36575, organizations should immediately audit their software dependencies to identify usage of getsetprop 1.1.0 and upgrade to a patched version once available. In the absence of an official patch, consider temporarily removing or replacing the vulnerable library with a secure alternative. Implement strict input validation and sanitization to prevent prototype pollution attacks. Employ runtime application self-protection (RASP) and web application firewalls (WAF) configured to detect and block suspicious prototype manipulation patterns. Conduct thorough code reviews focusing on object prototype handling and global property access. Monitor application logs and network traffic for unusual behavior indicative of exploitation attempts. Educate development teams about secure coding practices related to JavaScript prototype handling. Finally, maintain an incident response plan to quickly address any detected exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-30T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c5fb7ef31ef0b5636f6

Added to database: 2/25/2026, 9:40:47 PM

Last enriched: 2/28/2026, 3:28:37 AM

Last updated: 4/12/2026, 12:45:44 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses