Skip to content

Prototype Pollution in hello.js (Issue #634) #702

@abbadinikhilreddy55

Description

@abbadinikhilreddy55

The issue (titled “Prototype Pollution in hello.js” / Issue #634) reports that the function hello.utils.extend — which is part of hello.js — is vulnerable.
GitHub

The problem lies in the implementation of extend, which recursively merges object properties. The code doesn’t guard against merging into dangerous keys such as proto. That means an attacker may craft input that modifies an object’s prototype.
GitHub
+1

Through this vulnerability, malicious users could pollute the prototype chain, resulting in potential cross-site scripting (XSS) or even remote code execution depending on usage context.
GitHub
+2
clouddefense.ai
+2

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions