"protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.5 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-2072 "protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.5 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty.
Github GHSA Github GHSA GHSA-h755-8qp9-cq85 protobufjs Prototype Pollution vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T16:52:54.371Z

Reserved: 2023-06-25T00:00:00

Link: CVE-2023-36665

cve-icon Vulnrichment

Updated: 2024-08-02T16:52:54.371Z

cve-icon NVD

Status : Modified

Published: 2023-07-05T14:15:09.410

Modified: 2024-11-21T08:10:16.390

Link: CVE-2023-36665

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-07-05T00:00:00Z

Links: CVE-2023-36665 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses