CVE-2022-25878

The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multiple ways: 1. by providing untrusted user input to util.setProperty or to ReflectionObject.setParsedOption functions 2. by parsing/loading .proto files
Configurations

Configuration 1 (hide)

cpe:2.3:a:protobufjs_project:protobufjs:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 06:53

Type Values Removed Values Added
References () https://github.com/protobufjs/protobuf.js/blob/d13d5d5688052e366aa2e9169f50dfca376b32cf/src/util.js%23L176-L197 - Broken Link () https://github.com/protobufjs/protobuf.js/blob/d13d5d5688052e366aa2e9169f50dfca376b32cf/src/util.js%23L176-L197 - Broken Link
References () https://github.com/protobufjs/protobuf.js/commit/b5f1391dff5515894830a6570e6d73f5511b2e8f - Patch, Third Party Advisory () https://github.com/protobufjs/protobuf.js/commit/b5f1391dff5515894830a6570e6d73f5511b2e8f - Patch, Third Party Advisory
References () https://github.com/protobufjs/protobuf.js/pull/1731 - Patch, Third Party Advisory () https://github.com/protobufjs/protobuf.js/pull/1731 - Patch, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2841507 - Exploit, Patch, Third Party Advisory () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2841507 - Exploit, Patch, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JS-PROTOBUFJS-2441248 - Exploit, Patch, Third Party Advisory () https://snyk.io/vuln/SNYK-JS-PROTOBUFJS-2441248 - Exploit, Patch, Third Party Advisory
CVSS v2 : 5.0
v3 : 7.5
v2 : 5.0
v3 : 8.2

Information

Published : 2022-05-27 20:15

Updated : 2024-11-21 06:53


NVD link : CVE-2022-25878

Mitre link : CVE-2022-25878

CVE.ORG link : CVE-2022-25878


JSON object : View

Products Affected

protobufjs_project

  • protobufjs
CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')