CVE-2023-45811: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Synchrony deobfuscator is a javascript cleaner & deobfuscator. A __proto__
pollution vulnerability exists in versions before v2.4.4. Successful exploitation could lead to arbitrary code execution. A __proto__
pollution vulnerability exists in the LiteralMap
transformer allowing crafted input to modify properties in the Object prototype. A fix has been released in deobfuscator@2.4.4
. Users are advised to upgrade. Users unable to upgrade should launch node with the [–disable-proto=delete][disable-proto] or [–disable-proto=throw][disable-proto] flags
References
- github.com/advisories/GHSA-jg82-xh3w-rhxx
- github.com/relative/synchrony/commit/b583126be94c4db7c5a478f1c5204bfb4162cf40
- github.com/relative/synchrony/security/advisories/GHSA-jg82-xh3w-rhxx
- github.com/relative/synchrony/security/advisories/src/transformers/literalmap.ts
- nvd.nist.gov/vuln/detail/CVE-2023-45811
Detect and mitigate CVE-2023-45811 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →