Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can manipulate internal attributes by adding additional attributes to user input.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-0778 Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can manipulate internal attributes by adding additional attributes to user input.
Github GHSA Github GHSA GHSA-4x6v-rwh4-55jw Pomelo allows external control of critical state data
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T02:02:39.866Z

Reserved: 2019-11-13T00:00:00

Link: CVE-2019-18954

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-11-14T00:15:11.017

Modified: 2024-11-21T04:33:54.343

Link: CVE-2019-18954

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses