CVE-2023-0842: xml2js is vulnerable to prototype pollution
(updated )
xml2js versions before 0.5.0 allows an external attacker to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the __proto__
property to be edited.
References
- fluidattacks.com/advisories/myers
- github.com/Leonidas-from-XIV/node-xml2js
- github.com/Leonidas-from-XIV/node-xml2js/issues/663
- github.com/Leonidas-from-XIV/node-xml2js/pull/603/commits/581b19a62d88f8a3c068b5a45f4542c2d6a495a5
- github.com/advisories/GHSA-776f-qx25-q3cc
- lists.debian.org/debian-lts-announce/2024/03/msg00013.html
- nvd.nist.gov/vuln/detail/CVE-2023-0842
Detect and mitigate CVE-2023-0842 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →