-
Notifications
You must be signed in to change notification settings - Fork 143
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bug - Prototype Pollution on .set() #410
Comments
Any Updates on this its been close to a week and half |
@madarche do you have any thoughts on this? |
Hi sorry again for constant pestering but any updates on it 😅 |
@Captain-K-101 @clouserw all prototype pollution vulnerabilities should have been dealt with 🤔 I'll check and I'll report here! |
Sure Thanks 👍 |
Hey any updates?+ would this be eligible for a cve? |
@Captain-K-101 this is elligible for a CVE. Good catch. And I can't believe I've missed this. I've just created a PR #411 which fixes the vulnerability+test. I'll finish tomorrow. Sorry for the delay. |
Thanks a lot. 😄 |
Hi, would a CVE be assigned by you guys, or do i have to report it to cvemitre or smthing. (Not sure how it goes thus asking 😅) |
Fixed by #411 PS: I'll publish a new version of convict on npm ASAP and will keep you informed about the CVE or equivalent. @Captain-K-101 you'll be credited as you should. |
@Captain-K-101: [email protected] with the fix for the vulnerability you've discovered is published. I'll now work with @clouserw to have a security advisory published. I'll let you know as soon as it's done! Thanks again. |
sure thanks for the update |
Hey just a quick question would this be eligible for a cve. |
I've asked for one. I don't know how long it will take. |
oh okay. |
And the published security advisory is: GHSA-4jrm-c32x-w4jf |
Hey @madarche do we have any update on the cve? |
I'll ask for an update |
It's CVE-2023-0163. I added it to the security advisory. |
h nice thanks |
Convict is vulnerable to Prototype Pollution. This package allowing for modification of prototype behavior, which may result in Information Disclosure/DoS/RCE.
Proof of Concept
Create the following PoC file:
Run> node index.js
Output
💻 Technical Description *
Fix implemented by not allowing to modify object prototype.
Filter out all keywords and check for vulnerable instances like
constructor | __proto__ | prototype
Expolit Image
The text was updated successfully, but these errors were encountered: