{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T11:43:31.897","vulnerabilities":[{"cve":{"id":"CVE-2021-21304","sourceIdentifier":"security-advisories@github.com","published":"2021-02-08T18:15:13.537","lastModified":"2024-11-21T05:47:58.960","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Dynamoose is an open-source modeling tool for Amazon's DynamoDB. In Dynamoose from version 2.0.0 and before version 2.7.0 there was a prototype pollution vulnerability in the internal utility method \"lib/utils/object/set.ts\". This method is used throughout the codebase for various operations throughout Dynamoose. We have not seen any evidence of this vulnerability being exploited. There is no evidence this vulnerability impacts versions 1.x.x since the vulnerable method was added as part of the v2 rewrite. This vulnerability also impacts v2.x.x beta/alpha versions. Version 2.7.0 includes a patch for this vulnerability."},{"lang":"es","value":"Dynamoose es una herramienta de modelado de código abierto para DynamoDB de Amazon.&#xa0;En Dynamoose desde la versión 2.0.0 y anterior a la versión 2.7.0 había una vulnerabilidad de contaminación de prototipo en el método de utilidad interno \"lib/utils/object/set.ts\".&#xa0;Este método es usado en toda la base de código para varias operaciones en Dynamoose.&#xa0;No hemos visto ninguna evidencia de que haya sido explotada esta vulnerabilidad.&#xa0;No hay evidencia de que esta vulnerabilidad afecte a las versiones 1.xx ya que el método vulnerable se agregó como parte de la reescritura de v2.&#xa0;Esta vulnerabilidad también afecta a las versiones v2.xx beta/alpha.&#xa0;La versión 2.7.0 incluye un parche para esta vulnerabilidad"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":2.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-915"},{"lang":"en","value":"CWE-1321"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-1321"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dynamoosejs:dynamoose:*:*:*:*:*:node.js:*:*","versionStartIncluding":"2.0.0","versionEndExcluding":"2.7.0","matchCriteriaId":"48C7EF97-C20A-4C52-9651-A4D0F38AB9CE"}]}]}],"references":[{"url":"https://github.com/dynamoose/dynamoose/commit/324c62b4709204955931a187362f8999805b1d8e","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/dynamoose/dynamoose/releases/tag/v2.7.0","source":"security-advisories@github.com","tags":["Release Notes","Third Party Advisory"]},{"url":"https://github.com/dynamoose/dynamoose/security/advisories/GHSA-rrqm-p222-8ph2","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://www.npmjs.com/package/dynamoose","source":"security-advisories@github.com","tags":["Product","Third Party Advisory"]},{"url":"https://github.com/dynamoose/dynamoose/commit/324c62b4709204955931a187362f8999805b1d8e","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/dynamoose/dynamoose/releases/tag/v2.7.0","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Third Party Advisory"]},{"url":"https://github.com/dynamoose/dynamoose/security/advisories/GHSA-rrqm-p222-8ph2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.npmjs.com/package/dynamoose","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product","Third Party Advisory"]}]}}]}