漏洞标题
原型污染漏洞,在同步反序列化器中导致任意代码执行
漏洞描述信息
同步解混淆器中的原型污染漏洞可能导致任意代码执行
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
CWE-1321
漏洞标题
Prototype pollution vulnerability leading to arbitrary code execution in synchrony deobfuscator
漏洞描述信息
Synchrony deobfuscator is a javascript cleaner & deobfuscator. A `__proto__` pollution vulnerability exists in versions before v2.4.4. Successful exploitation could lead to arbitrary code execution. A `__proto__` pollution vulnerability exists in the `LiteralMap` transformer allowing crafted input to modify properties in the Object prototype. A fix has been released in `deobfuscator@2.4.4`. Users are advised to upgrade. Users unable to upgrade should launch node with the [--disable-proto=delete][disable-proto] or [--disable-proto=throw][disable-proto] flags
CVSS信息
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
漏洞类别
N/A
漏洞标题
synchrony 安全漏洞
漏洞描述信息
synchrony是relative个人开发者的一款 javascript-obfuscator 清理器和反混淆器。 synchrony v2.4.4之前版本存在安全漏洞,该漏洞源于存在原型污染漏洞。攻击者可利用该漏洞执行任意代码。
CVSS信息
N/A
漏洞类别
其他