{"id":"GHSA-p9f8-gqjf-m75j","summary":"Uncontrolled Resource Consumption in fastify-multipart","details":"Prototype pollution vulnerability in `fastify-multipart` \u003c 1.0.5 allows an attacker to crash fastify applications parsing multipart requests by sending a specially crafted request.","aliases":["CVE-2020-8136"],"modified":"2023-11-08T04:04:14.138026Z","published":"2021-05-06T17:28:36Z","database_specific":{"nvd_published_at":"2020-03-20T19:15:00Z","severity":"MODERATE","github_reviewed":true,"cwe_ids":["CWE-400"],"github_reviewed_at":"2021-05-05T22:07:09Z"},"references":[{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8136"},{"type":"WEB","url":"https://hackerone.com/reports/804772"}],"affected":[{"package":{"name":"fastify-multipart","ecosystem":"npm","purl":"pkg:npm/fastify-multipart"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.0.5"}]}],"database_specific":{"source":"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-p9f8-gqjf-m75j/GHSA-p9f8-gqjf-m75j.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}