Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w2cq-g8g3-gm83

Опубликовано: 12 авг. 2025
Источник: github
Github: Прошло ревью
CVSS4: 8.8

Описание

content-security-policy-parser Prototype Pollution Vulnerability May Lead to RCE

Impact

A prototype pollution vulnerability exists in versions 0.5.0 and earlier, wherein if you provide a policy name called __proto__ you can override the Object prototype.

For example:

const parse = require('content-security-policy-parser'); const x = parse("default-src 'self'; __proto__ foobar"); console.log('raw print:', x); console.log('toString:', x.toString());

Outputs:

raw print: Array { 'default-src': [ "'self'" ] } toString: foobar

Whilst no gadget exists in this library, it is possible via other libraries expose functionality that enable RCE. It is customary to label prototype pollution vulnerabilities in this way. The most common effect of this is denial of service, as you can trivially overwrite properties.

As the content security policy is provided in HTTP queries, it is incredibly likely that network exploitation is possible.

Patches

There has been a patch implemented a year ago (11 Feb 2024), but low uptake of patched versions has not been observed in the wild - only 17% of weekly downloads are of patched versions.

Workarounds

By disabling prototype method in NodeJS you can neutralise all possible prototype pollution attacks. Provide either --disable-proto=delete (recommended) or --disable-proto=throw as an argument to node to enable this feature.

References

Issue revealing the problem, January 26 2024 Commit fixing the problem

Credit to @EvanHahn for patching the vulnerability promptly, and @pnappa (Patrick Nappa) for discovery.

Пакеты

Наименование

content-security-policy-parser

npm
Затронутые версииВерсия исправления

< 0.6.0

0.6.0

EPSS

Процентиль: 34%
0.00138
Низкий

8.8 High

CVSS4

Дефекты

CWE-1321

Связанные уязвимости

nvd
6 месяцев назад

content-security-policy-parser parses content security policy directives. A prototype pollution vulnerability exists in versions 0.5.0 and earlier, wherein if a policy name is called __proto__, one can override the Object prototype. This issue has been patched in version 0.6.0. A workaround involves disabling prototype method in NodeJS, neutralizing all possible prototype pollution attacks. Provide either --disable-proto=delete (recommended) or --disable-proto=throw as an argument to node to enable this feature.

EPSS

Процентиль: 34%
0.00138
Низкий

8.8 High

CVSS4

Дефекты

CWE-1321