Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-4307: Security Fix for Prototype Pollution (#511) · Yomguithereal/baobab@c566395

A vulnerability was found in Yomguithereal Baobab up to 2.6.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes (‘prototype pollution’). The attack can be launched remotely. Upgrading to version 2.6.1 is able to address this issue. The name of the patch is c56639532a923d9a1600fb863ec7551b188b5d19. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217627.

CVE
#vulnerability#js#perl

Permalink

Browse files

Security Fix for Prototype Pollution (#511)

  • Loading branch information

huntr.dev | the place to protect open source committed

Jan 26, 2021

1 parent 9725f5e commit c56639532a923d9a1600fb863ec7551b188b5d19

Showing 2 changed files with 10 additions and 1 deletion.

    • helpers.js
    • helpers.ts

@@ -444,7 +444,8 @@ function merger(deep, …objects) {

for (k in t) {

if (deep &&

type.object(t[k]) &&

!(t[k] instanceof Monkey)) {

!(t[k] instanceof Monkey) &&

!(k === ‘__proto__’ || k === ‘constructor’ || k === ‘prototype’)) {

o[k] = merger(true, o[k] || {}, t[k]);

}

else {

@@ -94,6 +94,14 @@ describe('Helpers’, function() {

{one: {two: [3, 4]}, three: 3}

);

});

it('merge should not pollute object prototype.’, function() {

const data = JSON.parse(‘{"__proto__": {"polluted": true}}’);

deepMerge({}, data);

assert.equal(Object.keys(Object.prototype).includes(‘polluted’), false);

});

});

/**

0 comments on commit c566395

Please sign in to comment.

Related news

GHSA-wvr2-q86m-6whp: Baobab vulnerable to Prototype Pollution

A vulnerability was found in Yomguithereal Baobab up to 2.6.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be launched remotely. Upgrading to version 2.6.1 is able to address this issue. The name of the patch is c56639532a923d9a1600fb863ec7551b188b5d19. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217627.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda