Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36577: n/a

0
High
VulnerabilityCVE-2024-36577cvecve-2024-36577
Published: Mon Jun 17 2024 (06/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

apphp js-object-resolver < 3.1.1 is vulnerable to Prototype Pollution via Module.setNestedProperty.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:28:49 UTC

Technical Analysis

CVE-2024-36577 is a Prototype Pollution vulnerability identified in the apphp js-object-resolver JavaScript library versions prior to 3.1.1. The vulnerability resides in the Module.setNestedProperty function, which improperly handles nested property assignments, allowing attackers to inject or modify properties on the Object prototype. Prototype Pollution is a critical security issue in JavaScript environments because it enables attackers to manipulate the behavior of all objects inheriting from the polluted prototype, potentially leading to arbitrary code execution, data corruption, or denial of service. This vulnerability has a CVSS v3.1 score of 8.3, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), with low confidentiality impact (C:L), but high integrity (I:H) and availability (A:H) impacts. Although no exploits are currently known in the wild, the vulnerability poses a significant risk to applications using the affected library, especially web applications that process untrusted input. The weakness is related to CWE-79 (Improper Neutralization of Input During Web Page Generation) and CWE-1321 (Improper Handling of Prototype Pollution). Since the vulnerability allows modification of the prototype chain, attackers can alter application logic, bypass security controls, or cause application crashes. The lack of a patch link suggests that users should upgrade to version 3.1.1 or later once available or apply recommended mitigations.

Potential Impact

The impact of CVE-2024-36577 is substantial for organizations relying on the vulnerable apphp js-object-resolver library in their JavaScript applications. Exploitation can lead to unauthorized modification of application behavior, potentially allowing attackers to execute arbitrary code, escalate privileges, or cause denial of service. This compromises the integrity and availability of affected systems and may also lead to partial confidentiality breaches. Web applications processing untrusted user input are particularly at risk, as attackers can exploit this vulnerability remotely over the network with minimal complexity. The widespread use of JavaScript libraries in modern web development means that many organizations globally could be affected, especially those with large-scale web applications or services. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge rapidly. Organizations failing to address this vulnerability may face data breaches, service outages, reputational damage, and regulatory penalties.

Mitigation Recommendations

To mitigate CVE-2024-36577, organizations should promptly upgrade the apphp js-object-resolver library to version 3.1.1 or later once it is available, as this version addresses the Prototype Pollution vulnerability. In the interim, developers should implement strict input validation and sanitization to prevent untrusted data from influencing nested property assignments in the Module.setNestedProperty function. Employing security-focused code reviews and static analysis tools can help identify and remediate unsafe prototype manipulations. Additionally, applying runtime protections such as Content Security Policy (CSP) and enabling JavaScript engine hardening features can reduce exploitation impact. Monitoring application logs for unusual behavior related to object prototype modifications is advisable. Organizations should also maintain an inventory of applications using this library to prioritize patching efforts. Finally, educating developers about Prototype Pollution risks and secure coding practices will help prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-30T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c5fb7ef31ef0b5636f9

Added to database: 2/25/2026, 9:40:47 PM

Last enriched: 2/28/2026, 3:28:49 AM

Last updated: 4/12/2026, 3:45:15 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses