@Yoshino-s (https://huntr.dev/users/Yoshino-s) has fixed a potential Prototype Pollution vulnerability in your repository π¨. For more information, visit our website (https://huntr.dev/) or click the bounty URL below...
If you are happy with this disclosure, we would love to get a CVE assigned to the vulnerability. Feel free to credit @Yoshino-s, the discloser found in the bounty URL (below) and @huntr-helper.
With speficific input attckers can define properties on prototype, which will lead to prototype pollution.
Need node version>=12.0.0, which introduce Object.fromEntries
π» Technical Description *
when we access global value, it will just search by item.value in expr.functions, with which we can also access to prototype, __proto__, constructor, and assign some properties on it.
@Yoshino-s (https://huntr.dev/users/Yoshino-s) has fixed a potential Prototype Pollution vulnerability in your repository π¨. For more information, visit our website (https://huntr.dev/) or click the bounty URL below...
Q | A Version Affected | * Bug Fix | YES Original Pull Request | https://github.com/418sec/expr-eval/pull/1
If you are happy with this disclosure, we would love to get a CVE assigned to the vulnerability. Feel free to credit @Yoshino-s, the discloser found in the bounty URL (below) and @huntr-helper.
User Comments:
π Metadata *
Bounty URL: https://www.huntr.dev/bounties/1-npm-expr-eval/
βοΈ Description *
With speficific input attckers can define properties on prototype, which will lead to prototype pollution.
π» Technical Description *
when we access global value, it will just search by
item.value in expr.functions
, with which we can also access toprototype
,__proto__
,constructor
, and assign some properties on it.π Proof of Concept (PoC) *
π₯ Proof of Fix (PoF) *