CVE-2023-26102

All versions of the package rangy are vulnerable to Prototype Pollution when using the extend() function in file rangy-core.js.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype
References
Link Resource
https://github.com/timdown/rangy/issues/478 Exploit Issue Tracking Third Party Advisory
https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702 Exploit Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:rangy_project:rangy:-:*:*:*:*:node.js:*:*

Information

Published : 2023-02-23 21:15

Updated : 2023-03-02 09:29


NVD link : CVE-2023-26102

Mitre link : CVE-2023-26102


JSON object : View

CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Advertisement

dedicated server usa

Products Affected

rangy_project

  • rangy