Description
"protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.5 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty.
Published: 2023-07-05
Score: 9.8 Critical
EPSS: 1.7% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-2072 "protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.5 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty.
Github GHSA Github GHSA GHSA-h755-8qp9-cq85 protobufjs Prototype Pollution vulnerability
History

No history.

Subscriptions

Protobufjs Project Protobufjs
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T16:52:54.371Z

Reserved: 2023-06-25T00:00:00.000Z

Link: CVE-2023-36665

cve-icon Vulnrichment

Updated: 2024-08-02T16:52:54.371Z

cve-icon NVD

Status : Modified

Published: 2023-07-05T14:15:09.410

Modified: 2024-11-21T08:10:16.390

Link: CVE-2023-36665

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-07-05T00:00:00Z

Links: CVE-2023-36665 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses