-
Notifications
You must be signed in to change notification settings - Fork 616
Open
Description
The issue (titled “Prototype Pollution in hello.js” / Issue #634) reports that the function hello.utils.extend — which is part of hello.js — is vulnerable.
GitHub
The problem lies in the implementation of extend, which recursively merges object properties. The code doesn’t guard against merging into dangerous keys such as proto. That means an attacker may craft input that modifies an object’s prototype.
GitHub
+1
Through this vulnerability, malicious users could pollute the prototype chain, resulting in potential cross-site scripting (XSS) or even remote code execution depending on usage context.
GitHub
+2
clouddefense.ai
+2
MrSwitch
Metadata
Metadata
Assignees
Labels
No labels