CVE-2022-23631

superjson is a program to allow JavaScript expressions to be serialized to a superset of JSON. In versions prior to 1.8.1 superjson allows input to run arbitrary code on any server using superjson input without prior authentication or knowledge. The only requirement is that the server implements at least one endpoint which uses superjson during request processing. This has been patched in superjson 1.8.1. Users are advised to update. There are no known workarounds for this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:blitzjs:blitz:*:*:*:*:*:node.js:*:*
cpe:2.3:a:blitzjs:superjson:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 06:48

Type Values Removed Values Added
References () https://github.com/advisories/GHSA-5888-ffcr-r425 - Exploit, Third Party Advisory () https://github.com/advisories/GHSA-5888-ffcr-r425 - Exploit, Third Party Advisory
References () https://github.com/blitz-js/superjson/security/advisories/GHSA-5888-ffcr-r425 - Exploit, Third Party Advisory () https://github.com/blitz-js/superjson/security/advisories/GHSA-5888-ffcr-r425 - Exploit, Third Party Advisory
References () https://www.sonarsource.com/blog/blitzjs-prototype-pollution/ - Exploit, Third Party Advisory () https://www.sonarsource.com/blog/blitzjs-prototype-pollution/ - Exploit, Third Party Advisory
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 9.0

09 Jan 2024, 03:16

Type Values Removed Values Added
First Time Blitzjs blitz
CPE cpe:2.3:a:blitzjs:blitz:*:*:*:*:*:node.js:*:*
References (MISC) https://www.sonarsource.com/blog/blitzjs-prototype-pollution/ - (MISC) https://www.sonarsource.com/blog/blitzjs-prototype-pollution/ - Exploit, Third Party Advisory
References (MISC) https://github.com/advisories/GHSA-5888-ffcr-r425 - (MISC) https://github.com/advisories/GHSA-5888-ffcr-r425 - Exploit, Third Party Advisory
References (CONFIRM) https://github.com/blitz-js/superjson/security/advisories/GHSA-5888-ffcr-r425 - Third Party Advisory (CONFIRM) https://github.com/blitz-js/superjson/security/advisories/GHSA-5888-ffcr-r425 - Exploit, Third Party Advisory

31 Oct 2023, 23:15

Type Values Removed Values Added
CWE CWE-1321 CWE-94
References
  • (MISC) https://www.sonarsource.com/blog/blitzjs-prototype-pollution/ -
  • (MISC) https://github.com/advisories/GHSA-5888-ffcr-r425 -
Summary superjson is a program to allow JavaScript expressions to be serialized to a superset of JSON. In versions prior to 1.8.1 superjson allows input to run arbitrary code on any server using superjson input without prior authentication or knowledge. The only requirement is that the server implements at least one endpoint which uses superjson during request processing. This has been patched in superjson 1.8.1. Users are advised to update. There are no known workarounds for this issue. superjson is a program to allow JavaScript expressions to be serialized to a superset of JSON. In versions prior to 1.8.1 superjson allows input to run arbitrary code on any server using superjson input without prior authentication or knowledge. The only requirement is that the server implements at least one endpoint which uses superjson during request processing. This has been patched in superjson 1.8.1. Users are advised to update. There are no known workarounds for this issue.

Information

Published : 2022-02-09 22:15

Updated : 2024-11-21 06:48


NVD link : CVE-2022-23631

Mitre link : CVE-2022-23631

CVE.ORG link : CVE-2022-23631


JSON object : View

Products Affected

blitzjs

  • blitz
  • superjson
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')