Prototype Pollution Affecting madlib-object-utils Open this link in a new tab package, versions <0.1.7
Exploit Maturity
Proof of concept
Attack Complexity
Low
Availability
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-JS-MADLIBOBJECTUTILS-598676
-
published
14 Aug 2020
-
disclosed
14 Aug 2020
-
credit
Beomjin Lee
Introduced: 14 Aug 2020
CVE-2020-7701 Open this link in a new tabHow to fix?
Upgrade madlib-object-utils
to version 0.1.7 or higher.
Overview
madlib-object-utils is an A small set of utility functions for working with objects
Affected versions of this package are vulnerable to Prototype Pollution via setValue
.
POC:
const objectUtils = require("madlib-object-utils");
objectUtils.setValue('__proto__.polluted', {}, true);
console.log(polluted);