CVE-2022-25878

The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multiple ways: 1. by providing untrusted user input to util.setProperty or to ReflectionObject.setParsedOption functions 2. by parsing/loading .proto files
Configurations

Configuration 1 (hide)

cpe:2.3:a:protobufjs_project:protobufjs:*:*:*:*:*:node.js:*:*

History

08 Jun 2022, 17:22

Type Values Removed Values Added
CWE CWE-1321
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
References (CONFIRM) https://github.com/protobufjs/protobuf.js/blob/d13d5d5688052e366aa2e9169f50dfca376b32cf/src/util.js%23L176-L197 - (CONFIRM) https://github.com/protobufjs/protobuf.js/blob/d13d5d5688052e366aa2e9169f50dfca376b32cf/src/util.js%23L176-L197 - Broken Link
References (CONFIRM) https://github.com/protobufjs/protobuf.js/pull/1731 - (CONFIRM) https://github.com/protobufjs/protobuf.js/pull/1731 - Patch, Third Party Advisory
References (CONFIRM) https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2841507 - (CONFIRM) https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2841507 - Exploit, Patch, Third Party Advisory
References (CONFIRM) https://snyk.io/vuln/SNYK-JS-PROTOBUFJS-2441248 - (CONFIRM) https://snyk.io/vuln/SNYK-JS-PROTOBUFJS-2441248 - Exploit, Patch, Third Party Advisory
References (CONFIRM) https://github.com/protobufjs/protobuf.js/commit/b5f1391dff5515894830a6570e6d73f5511b2e8f - (CONFIRM) https://github.com/protobufjs/protobuf.js/commit/b5f1391dff5515894830a6570e6d73f5511b2e8f - Patch, Third Party Advisory
CPE cpe:2.3:a:protobufjs_project:protobufjs:*:*:*:*:*:node.js:*:*
First Time Protobufjs Project protobufjs
Protobufjs Project

02 Jun 2022, 14:15

Type Values Removed Values Added
Summary The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multiple ways: 1. by providing untrusted user input to util.setProperty or to ReflectionObject.setParsedOption functions 2. by parsing/loading .proto files The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multiple ways: 1. by providing untrusted user input to util.setProperty or to ReflectionObject.setParsedOption functions 2. by parsing/loading .proto files

27 May 2022, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-05-27 20:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-25878

Mitre link : CVE-2022-25878

CVE.ORG link : CVE-2022-25878


JSON object : View

Products Affected

protobufjs_project

  • protobufjs
CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')