Описание
OroPlatform is a PHP Business Application Platform. In affected versions by sending a specially crafted request, an attacker could inject properties into existing JavaScript language construct prototypes, such as objects. Later this injection may lead to JS code execution by libraries that are vulnerable to Prototype Pollution. This issue has been patched in version 4.2.8. Users unable to upgrade may configure a firewall to drop requests containing next strings: __proto__ , constructor[prototype], and constructor.prototype to mitigate this issue.
Ссылки
- PatchThird Party Advisory
- MitigationThird Party Advisory
- PatchThird Party Advisory
- MitigationThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 4.1.0 (включая) до 4.1.14 (исключая)Версия от 4.2.0 (включая) до 4.2.8 (исключая)
Одно из
cpe:2.3:a:oroinc:oroplatform:*:*:*:*:*:*:*:*
cpe:2.3:a:oroinc:oroplatform:*:*:*:*:*:*:*:*
EPSS
Процентиль: 70%
0.00626
Низкий
8.8 High
CVSS3
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-74
CWE-1321
Связанные уязвимости
CVSS3: 5.3
github
около 4 лет назад
Client-Side JavaScript Prototype Pollution in oro/platform
EPSS
Процентиль: 70%
0.00626
Низкий
8.8 High
CVSS3
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-74
CWE-1321