File tree Expand file tree Collapse file tree 2 files changed +4
-4
lines changed
javascript/ql/src/Security/CWE-400 Expand file tree Collapse file tree 2 files changed +4
-4
lines changed Original file line number Diff line number Diff line change 66<overview >
77 <p >
88 Most JavaScript objects inherit the properties of the built-in <code >Object.prototype</code > object.
9- Prototype pollution is a type of vulnerability in which an attacker is be able to modify <code >Object.prototype</code >.
9+ Prototype pollution is a type of vulnerability in which an attacker is able to modify <code >Object.prototype</code >.
1010 Since most objects inherit from the compromised <code >Object.prototype</code >, the attacker can use this
1111 to tamper with the application logic, and often escalate to remote code execution or cross-site scripting.
1212 </p >
2424<recommendation >
2525 <p >
2626 Update your library dependencies in order to use a safe version of the <em >merge</em > or <em >extend</em > function.
27- If you library has no fixed version, switch to another library.
27+ If your library has no fixed version, switch to another library.
2828 </p >
2929</recommendation >
3030
7171 <a href =" https://hackerone.com/reports/454365" >jQuery</a >,
7272 <a href =" https://hackerone.com/reports/381185" >extend</a >,
7373 <a href =" https://hackerone.com/reports/430291" >just-extend</a >,
74- <a href =" https://hackerone.com/reports/381194" >merge.recursive</a >,
74+ <a href =" https://hackerone.com/reports/381194" >merge.recursive</a >.
7575 </li >
7676 <li >Express:
7777 <a href =" https://expressjs.com/en/api.html#express.urlencoded" >urlencoded()</a >
Original file line number Diff line number Diff line change 11/**
2- * @name Prototype Pollution
2+ * @name Prototype pollution
33 * @description Recursively merging a user-controlled object into another object
44 * can allow an attacker to modify the built-in Object prototype.
55 * @kind path-problem
You can’t perform that action at this time.
0 commit comments