Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hrpp-h998-j3pp

Опубликовано: 27 нояб. 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

qs vulnerable to Prototype Pollution

qs before 6.10.3 allows attackers to cause a Node process hang because an __ proto__ key can be used. In many typical web framework use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4.

Пакеты

Наименование

qs

npm
Затронутые версииВерсия исправления

>= 6.10.0, < 6.10.3

6.10.3

Наименование

qs

npm
Затронутые версииВерсия исправления

>= 6.9.0, < 6.9.7

6.9.7

Наименование

qs

npm
Затронутые версииВерсия исправления

>= 6.8.0, < 6.8.3

6.8.3

Наименование

qs

npm
Затронутые версииВерсия исправления

>= 6.7.0, < 6.7.3

6.7.3

Наименование

qs

npm
Затронутые версииВерсия исправления

>= 6.6.0, < 6.6.1

6.6.1

Наименование

qs

npm
Затронутые версииВерсия исправления

>= 6.5.0, < 6.5.3

6.5.3

Наименование

qs

npm
Затронутые версииВерсия исправления

>= 6.4.0, < 6.4.1

6.4.1

Наименование

qs

npm
Затронутые версииВерсия исправления

>= 6.3.0, < 6.3.3

6.3.3

Наименование

qs

npm
Затронутые версииВерсия исправления

< 6.2.4

6.2.4

EPSS

Процентиль: 87%
0.03395
Низкий

7.5 High

CVSS3

Дефекты

CWE-1321

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 2 лет назад

qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs@6.9.7" in its release description, is not vulnerable).

CVSS3: 7.5
redhat
больше 2 лет назад

qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs@6.9.7" in its release description, is not vulnerable).

CVSS3: 7.5
nvd
больше 2 лет назад

qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs@6.9.7" in its release description, is not vulnerable).

CVSS3: 7.5
debian
больше 2 лет назад

qs before 6.10.3, as used in Express before 4.17.3 and other products, ...

rocky
больше 2 лет назад

Moderate: nodejs:14 security, bug fix, and enhancement update

EPSS

Процентиль: 87%
0.03395
Низкий

7.5 High

CVSS3

Дефекты

CWE-1321