CVE-2024-57065

7.5 HIGH

📋 TL;DR

A prototype pollution vulnerability in the lib.createPath function of utile v0.3.0 allows attackers to manipulate JavaScript object prototypes, potentially causing application crashes or denial of service. This affects any application using the vulnerable version of the utile library.

💻 Affected Systems

Products:
  • utile
Versions: v0.3.0
Operating Systems: All platforms running Node.js
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications that use the lib.createPath function from the utile library. The vulnerability is in the library itself, not dependent on specific application configurations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash leading to sustained denial of service, potentially affecting multiple services if the library is widely used in the environment.

🟠

Likely Case

Application instability or crashes when processing malicious input, resulting in temporary service disruption.

🟢

If Mitigated

Limited impact with proper input validation and sandboxing in place, potentially causing isolated errors but not system-wide crashes.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires the ability to supply crafted input to the vulnerable function. The vulnerability is specific to prototype pollution patterns in JavaScript.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to utile v0.3.1 or later

Vendor Advisory: https://github.com/flatiron/utile

Restart Required: Yes

Instructions:

1. Check current utile version in package.json. 2. Update package.json to use 'utile': '^0.3.1'. 3. Run 'npm update utile' or 'yarn upgrade utile'. 4. Restart the application.

🔧 Temporary Workarounds

Input Validation

all

Implement strict input validation for any data passed to lib.createPath function

🧯 If You Can't Patch

  • Implement WAF rules to block suspicious payload patterns
  • Isolate affected applications in network segments

🔍 How to Verify

Check if Vulnerable:

Check package.json or node_modules/utile/package.json for version 0.3.0

Check Version:

npm list utile | grep utile or cat node_modules/utile/package.json | grep version

Verify Fix Applied:

Verify package.json shows utile version 0.3.1 or higher and application functions normally with test inputs

📡 Detection & Monitoring

Log Indicators:

  • Application crashes or unexpected termination
  • Error messages related to prototype pollution or object manipulation
  • Unusual memory usage patterns

Network Indicators:

  • Sudden drop in application availability
  • Increased error responses from affected services

SIEM Query:

source="application.logs" AND ("prototype pollution" OR "utile" OR "lib.createPath")

🔗 References

📤 Share & Export