carboneio carbone up to fbcd349077ad0e8748be73eab2a82ea92b6f8a7e Formatter lib/input.js prototype pollution
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.9 | $0-$5k | 0.76 |
Summary
A vulnerability has been found in carboneio carbone up to fbcd349077ad0e8748be73eab2a82ea92b6f8a7e and classified as problematic. Affected is an unknown function of the file lib/input.js of the component Formatter Handler. The manipulation leads to prototype pollution. This vulnerability is listed as CVE-2024-14020. The attack may be initiated remotely. There is no available exploit. The affected component should be upgraded. A successful exploitation can "only occur if the parent NodeJS application has the same security issue".
Details
A vulnerability was found in carboneio carbone up to fbcd349077ad0e8748be73eab2a82ea92b6f8a7e and classified as problematic. This issue affects an unknown part of the file lib/input.js of the component Formatter Handler. The manipulation with an unknown input leads to a prototype pollution vulnerability. Using CWE to declare the problem leads to CWE-1321. The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype. Impacted is confidentiality, integrity, and availability.
The weakness was presented 06/12/2024 as 04f9feb24bfca23567706392f9ad2c53bbe4134e. It is possible to read the advisory at github.com. The identification of this vulnerability is CVE-2024-14020. The exploitation is known to be difficult. The attack may be initiated remotely. Technical details of the vulnerability are known, but there is no available exploit. The attack technique deployed by this issue is T1059 according to MITRE ATT&CK.
A successful exploitation can "only occur if the parent NodeJS application has the same security issue".
Upgrading to version 3.5.6 eliminates this vulnerability. The upgrade is hosted for download at github.com. Applying the patch 04f9feb24bfca23567706392f9ad2c53bbe4134e is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version. A possible mitigation has been published immediately after the disclosure of the vulnerability. The advisory contains the following remark:
Security fix: Removed the possibility of prototype pollution in formatters.
Be aware that VulDB is the high quality source for vulnerability data.
Product
Vendor
Name
Version
License
Website
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CNA CVSS-B Score: 🔍
CNA CVSS-BT Score: 🔍
CNA Vector: 🔍
CVSSv3
VulDB Meta Base Score: 5.0VulDB Meta Temp Score: 4.9
VulDB Base Score: 5.0
VulDB Temp Score: 4.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CNA Base Score: 5.0
CNA Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Prototype pollutionCWE: CWE-1321 / CWE-94 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: carbone 3.5.6
Patch: 04f9feb24bfca23567706392f9ad2c53bbe4134e
Timeline
06/12/2024 🔍06/12/2024 🔍
01/04/2026 🔍
01/07/2026 🔍
Sources
Product: github.comAdvisory: 04f9feb24bfca23567706392f9ad2c53bbe4134e
Status: Confirmed
CVE: CVE-2024-14020 (🔍)
GCVE (CVE): GCVE-0-2024-14020
GCVE (VulDB): GCVE-100-339503
Entry
Created: 01/04/2026 19:28Updated: 01/07/2026 13:35
Changes: 01/04/2026 19:28 (61), 01/07/2026 13:35 (30)
Complete: 🔍
Cache ID: 216::103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.