CVE-2024-57069
Published: 05 February 2025
Summary
CVE-2024-57069 is a high-severity Prototype Pollution (CWE-1321) vulnerability. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 40.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires timely flaw remediation, directly addressing the prototype pollution vulnerability in expand-object v0.4.2 by patching or upgrading to a non-vulnerable version.
SC-5 implements denial-of-service protections such as resource limits and traffic filtering to block crafted payloads that trigger the DoS condition.
SI-10 enforces input validation to detect and reject specially crafted payloads targeting prototype pollution in the lib function.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Prototype pollution in public-facing JS package directly enables remote unauthenticated exploitation (T1190) leading to application-layer DoS via crafted input (T1499.004).
NVD Description
A prototype pollution in the lib function of expand-object v0.4.2 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload.
Deeper analysisAI
CVE-2024-57069 is a prototype pollution vulnerability in the lib function of the expand-object package version 0.4.2. This issue allows attackers to cause a Denial of Service (DoS) condition by supplying a crafted payload. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high severity primarily due to its impact on availability, and is classified under CWE-1321.
The vulnerability can be exploited over the network by any unauthenticated attacker with low complexity and no need for user interaction. By providing a specially crafted payload to the affected lib function, the attacker can trigger a DoS, disrupting service availability without affecting confidentiality or integrity.
Advisories and additional details are available in the referenced GitHub Gist at https://gist.github.com/tariqhawis/68e06b00e3258d0d427257c6906bd300.
Details
- CWE(s)