Vulnerabilities
Vulnerable Software
Protobufjs Project:  >> Protobufjs  Security Vulnerabilities
"protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.5 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty.
CVSS Score
9.8
EPSS Score
0.017
Published
2023-07-05
The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multiple ways: 1. by providing untrusted user input to util.setProperty or to ReflectionObject.setParsedOption functions 2. by parsing/loading .proto files
CVSS Score
8.2
EPSS Score
0.004
Published
2022-05-27
protobufjs is vulnerable to ReDoS when parsing crafted invalid .proto files.
CVSS Score
5.5
EPSS Score
0.004
Published
2018-06-07


Contact Us

Shodan ® - All rights reserved