All versions of
ini-parser are vulnerable to prototype pollution. The
parse function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
No fix is currently available. Consider using an alternative package until a fix is made available.
publishedAdvisory PublishedMay 19th, 2020
reportedReported by JHU System Security LabApr 9th, 2020