GMS-2020-382: Prototype Pollution in mithril
(updated )
Affected versions of mithril
are vulnerable to prototype pollution. The function parseQueryString
may allow a malicious user to modify the prototype of Object
, causing the addition or modification of an existing property that will exist on all objects. A payload such as __proto__%5BtoString%5D=123
in the query string would change the toString()
function to 123
.
If you are using mithril, upgrade to or later.
If you are using mithril, upgrade to or later.
References
Detect and mitigate GMS-2020-382 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →