CVE-2023-36665
ADVISORY - githubSummary
protobuf.js (aka protobufjs) 6.10.0 until 6.11.4 and 7.0.0 until 7.2.4 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty. NOTE: this CVE Record is about Object.constructor.prototype.<new-property> = ...;
whereas CVE-2022-25878 was about Object.__proto__.<new-property> = ...;
instead.
Common Weakness Enumeration (CWE)
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
NIST
3.9
CVSS SCORE
9.8criticalGitHub
3.9
CVSS SCORE
9.8criticalRed Hat
3.9
CVSS SCORE
8.6mediumChainguard
CGA-9c79-2q9x-78w6
-
intheWild
-
-