CVE-2023-26102

All versions of the package rangy are vulnerable to Prototype Pollution when using the extend() function in file rangy-core.js.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype
References
Link Resource
https://github.com/timdown/rangy/issues/478 Exploit Issue Tracking Third Party Advisory
https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:rangy_project:rangy:-:*:*:*:*:node.js:*:*

History

07 Nov 2023, 04:09

Type Values Removed Values Added
Summary All versions of the package rangy are vulnerable to Prototype Pollution when using the extend() function in file rangy-core.js.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype All versions of the package rangy are vulnerable to Prototype Pollution when using the extend() function in file rangy-core.js.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype

02 Mar 2023, 17:29

Type Values Removed Values Added
CPE cpe:2.3:a:rangy_project:rangy:-:*:*:*:*:node.js:*:*
CWE CWE-1321
First Time Rangy Project
Rangy Project rangy
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.2
References (MISC) https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702 - (MISC) https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702 - Exploit, Third Party Advisory
References (MISC) https://github.com/timdown/rangy/issues/478 - (MISC) https://github.com/timdown/rangy/issues/478 - Exploit, Issue Tracking, Third Party Advisory

24 Feb 2023, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-24 05:15

Updated : 2023-12-10 14:48


NVD link : CVE-2023-26102

Mitre link : CVE-2023-26102

CVE.ORG link : CVE-2023-26102


JSON object : View

Products Affected

rangy_project

  • rangy
CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')