Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x3cc-x39p-42qx

Опубликовано: 13 июн. 2023
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

fast-xml-parser vulnerable to Prototype Pollution through tag or attribute name

Impact

As a part of this vulnerability, user was able to se code using __proto__ as a tag or attribute name.

const { XMLParser, XMLBuilder, XMLValidator} = require("fast-xml-parser"); let XMLdata = "<__proto__><polluted>hacked</polluted></__proto__>" const parser = new XMLParser(); let jObj = parser.parse(XMLdata); console.log(jObj.polluted) // should return hacked

Patches

The problem has been patched in v4.1.2

Workarounds

User can check for "proto" in the XML string before parsing it to the parser.

References

https://gist.github.com/Sudistark/a5a45bd0804d522a1392cb5023aa7ef7

Пакеты

Наименование

fast-xml-parser

npm
Затронутые версииВерсия исправления

< 4.1.2

4.1.2

EPSS

Процентиль: 45%
0.00226
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-1321

Связанные уязвимости

CVSS3: 6.5
nvd
около 2 лет назад

fast-xml-parser before 4.1.2 allows __proto__ for Prototype Pollution.

EPSS

Процентиль: 45%
0.00226
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-1321