Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h755-8qp9-cq85

Опубликовано: 05 июл. 2023
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

protobufjs Prototype Pollution vulnerability

protobuf.js (aka protobufjs) 6.10.0 until 6.11.4 and 7.0.0 until 7.2.4 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty. NOTE: this CVE Record is about Object.constructor.prototype.<new-property> = ...; whereas CVE-2022-25878 was about Object.__proto__.<new-property> = ...; instead.

Пакеты

Наименование

protobufjs

npm
Затронутые версииВерсия исправления

>= 7.0.0, < 7.2.5

7.2.5

Наименование

protobufjs

npm
Затронутые версииВерсия исправления

>= 6.10.0, < 6.11.4

6.11.4

EPSS

Процентиль: 82%
0.01673
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-1321

Связанные уязвимости

CVSS3: 8.6
redhat
больше 2 лет назад

"protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.5 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty.

CVSS3: 9.8
nvd
больше 2 лет назад

"protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.5 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty.

EPSS

Процентиль: 82%
0.01673
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-1321