The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multiple ways: 1. by providing untrusted user input to util.setProperty or to ReflectionObject.setParsedOption functions 2. by parsing/loading .proto files
CPE | Name | Operator | Version |
---|---|---|---|
protobuf.js | eq | 6.6.5 | |
protobuf.js | eq | 6.3.0 | |
protobuf.js | eq | 6.0.2 | |
protobuf.js | eq | 6.4.1 | |
protobuf.js | eq | 6.5.3 | |
protobuf.js | eq | 6.5.1 | |
protobuf.js | eq | 6.2.1 | |
protobuf.js | eq | 6.6.0 | |
protobuf.js | eq | 6.4.3 | |
protobuf.js | eq | 6.10.0-beta.2 |
github.com/protobufjs/protobuf.js/blob/d13d5d5688052e366aa2e9169f50dfca376b32cf/src/util.js%23L176-L197
github.com/protobufjs/protobuf.js/commit/b5f1391dff5515894830a6570e6d73f5511b2e8f
github.com/protobufjs/protobuf.js/pull/1731
snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2841507
snyk.io/vuln/SNYK-JS-PROTOBUFJS-2441248