@apollo/protobufjs@1.2.8

Protocol Buffers for JavaScript (& TypeScript).

Direct Vulnerabilities

Known vulnerabilities in the @apollo/protobufjs package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • C
Arbitrary Code Injection

@apollo/protobufjs is a language-neutral, platform-neutral, extensible way of serializing structured data for use in communications protocols, data storage, and more, originally designed at Google

Affected versions of this package are vulnerable to Arbitrary Code Injection through the handling of user-supplied protobuf definitions, specifically via the Type's name field. An attacker can execute arbitrary JavaScript code by injecting malicious payloads into the protobuf definition, which are then executed during object decoding.

Notes:

  • The vulnerability was introduced during the migration to codegen 2 where sanitization of the type name was modified.
  • Additional security measures were introduced in @protobufjs/codegen@2.0.5, which could hinder exploitation on vulnerable versions.

How to fix Arbitrary Code Injection?

There is no fixed version for @apollo/protobufjs.

*