CVE-2022-23631

superjson is a program to allow JavaScript expressions to be serialized to a superset of JSON. In versions prior to 1.8.1 superjson allows input to run arbitrary code on any server using superjson input without prior authentication or knowledge. The only requirement is that the server implements at least one endpoint which uses superjson during request processing. This has been patched in superjson 1.8.1. Users are advised to update. There are no known workarounds for this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:blitzjs:blitz:*:*:*:*:*:node.js:*:*
cpe:2.3:a:blitzjs:superjson:*:*:*:*:*:node.js:*:*

History

09 Jan 2024, 03:16

Type Values Removed Values Added
References () https://github.com/advisories/GHSA-5888-ffcr-r425 - () https://github.com/advisories/GHSA-5888-ffcr-r425 - Exploit, Third Party Advisory
References () https://github.com/blitz-js/superjson/security/advisories/GHSA-5888-ffcr-r425 - Third Party Advisory () https://github.com/blitz-js/superjson/security/advisories/GHSA-5888-ffcr-r425 - Exploit, Third Party Advisory
References () https://www.sonarsource.com/blog/blitzjs-prototype-pollution/ - () https://www.sonarsource.com/blog/blitzjs-prototype-pollution/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:blitzjs:blitz:*:*:*:*:*:node.js:*:*
First Time Blitzjs blitz

31 Oct 2023, 23:15

Type Values Removed Values Added
References
  • (MISC) https://www.sonarsource.com/blog/blitzjs-prototype-pollution/ -
  • (MISC) https://github.com/advisories/GHSA-5888-ffcr-r425 -
CWE CWE-1321 CWE-94
Summary superjson is a program to allow JavaScript expressions to be serialized to a superset of JSON. In versions prior to 1.8.1 superjson allows input to run arbitrary code on any server using superjson input without prior authentication or knowledge. The only requirement is that the server implements at least one endpoint which uses superjson during request processing. This has been patched in superjson 1.8.1. Users are advised to update. There are no known workarounds for this issue. superjson is a program to allow JavaScript expressions to be serialized to a superset of JSON. In versions prior to 1.8.1 superjson allows input to run arbitrary code on any server using superjson input without prior authentication or knowledge. The only requirement is that the server implements at least one endpoint which uses superjson during request processing. This has been patched in superjson 1.8.1. Users are advised to update. There are no known workarounds for this issue.

15 Feb 2022, 18:33

Type Values Removed Values Added
First Time Blitzjs superjson
Blitzjs
CPE cpe:2.3:a:blitzjs:superjson:*:*:*:*:*:node.js:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CWE CWE-94 CWE-1321
References (CONFIRM) https://github.com/blitz-js/superjson/security/advisories/GHSA-5888-ffcr-r425 - (CONFIRM) https://github.com/blitz-js/superjson/security/advisories/GHSA-5888-ffcr-r425 - Third Party Advisory

09 Feb 2022, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-09 22:15

Updated : 2024-01-09 03:16


NVD link : CVE-2022-23631

Mitre link : CVE-2022-23631

CVE.ORG link : CVE-2022-23631


JSON object : View

Products Affected

blitzjs

  • superjson
  • blitz
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')