Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') Affecting grafana package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS9-GRAFANA-2886375
- published 7 Jun 2022
- disclosed 27 May 2022
Introduced: 27 May 2022
CVE-2022-25878 Open this link in a new tabHow to fix?
There is no fixed version for Centos:9
grafana
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream grafana
package and not the grafana
package as distributed by Centos
.
See How to fix?
for Centos:9
relevant fixed versions and status.
The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multiple ways: 1. by providing untrusted user input to util.setProperty or to ReflectionObject.setParsedOption functions 2. by parsing/loading .proto files
References
- https://access.redhat.com/security/cve/CVE-2022-25878
- https://github.com/protobufjs/protobuf.js/blob/d13d5d5688052e366aa2e9169f50dfca376b32cf/src/util.js%23L176-L197
- https://github.com/protobufjs/protobuf.js/commit/b5f1391dff5515894830a6570e6d73f5511b2e8f
- https://github.com/protobufjs/protobuf.js/pull/1731
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2841507
- https://snyk.io/vuln/SNYK-JS-PROTOBUFJS-2441248