The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multiple ways: 1. by providing untrusted user input to util.setProperty or to ReflectionObject.setParsedOption functions 2. by parsing/loading .proto files
References
Link | Resource |
---|---|
https://github.com/protobufjs/protobuf.js/pull/1731 | Patch Third Party Advisory |
https://github.com/protobufjs/protobuf.js/blob/d13d5d5688052e366aa2e9169f50dfca376b32cf/src/util.js%23L176-L197 | Broken Link |
https://github.com/protobufjs/protobuf.js/commit/b5f1391dff5515894830a6570e6d73f5511b2e8f | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-PROTOBUFJS-2441248 | Exploit Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2841507 | Exploit Patch Third Party Advisory |
Configurations
Information
Published : 2022-05-27 13:15
Updated : 2022-06-08 10:22
NVD link : CVE-2022-25878
Mitre link : CVE-2022-25878
JSON object : View
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Products Affected
protobufjs_project
- protobufjs