Lucene search

K
nodejsHoLyVieRNODEJS:566
HistoryApr 20, 2018 - 9:25 p.m.

Prototype Pollution

2018-04-2021:25:58
HoLyVieR
www.npmjs.com
248

0.01 Low

EPSS

Percentile

83.9%

Overview

Versions of hoek prior to 4.2.1 and 5.0.3 are vulnerable to prototype pollution.

The merge function, and the applyToDefaults and applyToDefaultsWithShallow functions which leverage merge behind the scenes, are vulnerable to a prototype pollution attack when provided an unvalidated payload created from a JSON string containing the __proto__ property.

This can be demonstrated like so:

var Hoek = require('hoek');
var malicious_payload = '{"__proto__":{"oops":"It works !"}}';

var a = {};
console.log("Before : " + a.oops);
Hoek.merge({}, JSON.parse(malicious_payload));
console.log("After : " + a.oops);

This type of attack can be used to overwrite existing properties causing a potential denial of service.

Recommendation

Update to version 4.2.1, 5.0.3 or later.

References

CPENameOperatorVersion
hoekle 4.2.0 || >= 5.0.0 < 5.0.3