CVE-2022-23631

superjson is a program to allow JavaScript expressions to be serialized to a superset of JSON. In versions prior to 1.8.1 superjson allows input to run arbitrary code on any server using superjson input without prior authentication or knowledge. The only requirement is that the server implements at least one endpoint which uses superjson during request processing. This has been patched in superjson 1.8.1. Users are advised to update. There are no known workarounds for this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:blitzjs:blitz:*:*:*:*:*:node.js:*:*
cpe:2.3:a:blitzjs:superjson:*:*:*:*:*:node.js:*:*

History

09 Jan 2024, 03:16

Type Values Removed Values Added
References (MISC) https://www.sonarsource.com/blog/blitzjs-prototype-pollution/ - (MISC) https://www.sonarsource.com/blog/blitzjs-prototype-pollution/ - Exploit, Third Party Advisory
References (MISC) https://github.com/advisories/GHSA-5888-ffcr-r425 - (MISC) https://github.com/advisories/GHSA-5888-ffcr-r425 - Exploit, Third Party Advisory
References (CONFIRM) https://github.com/blitz-js/superjson/security/advisories/GHSA-5888-ffcr-r425 - Third Party Advisory (CONFIRM) https://github.com/blitz-js/superjson/security/advisories/GHSA-5888-ffcr-r425 - Exploit, Third Party Advisory
CPE cpe:2.3:a:blitzjs:blitz:*:*:*:*:*:node.js:*:*
First Time Blitzjs blitz

31 Oct 2023, 23:15

Type Values Removed Values Added
Summary superjson is a program to allow JavaScript expressions to be serialized to a superset of JSON. In versions prior to 1.8.1 superjson allows input to run arbitrary code on any server using superjson input without prior authentication or knowledge. The only requirement is that the server implements at least one endpoint which uses superjson during request processing. This has been patched in superjson 1.8.1. Users are advised to update. There are no known workarounds for this issue. superjson is a program to allow JavaScript expressions to be serialized to a superset of JSON. In versions prior to 1.8.1 superjson allows input to run arbitrary code on any server using superjson input without prior authentication or knowledge. The only requirement is that the server implements at least one endpoint which uses superjson during request processing. This has been patched in superjson 1.8.1. Users are advised to update. There are no known workarounds for this issue.
CWE CWE-1321 CWE-94
References
  • (MISC) https://www.sonarsource.com/blog/blitzjs-prototype-pollution/ -
  • (MISC) https://github.com/advisories/GHSA-5888-ffcr-r425 -

Information

Published : 2022-02-09 22:15

Updated : 2024-02-28 19:09


NVD link : CVE-2022-23631

Mitre link : CVE-2022-23631

CVE.ORG link : CVE-2022-23631


JSON object : View

Products Affected

blitzjs

  • superjson
  • blitz
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')