xml2js is vulnerable to prototype pollution
Moderate severity
GitHub Reviewed
Published
Apr 5, 2023
to the GitHub Advisory Database
•
Updated Mar 14, 2024
Description
Published by the National Vulnerability Database
Apr 5, 2023
Published to the GitHub Advisory Database
Apr 5, 2023
Reviewed
Apr 7, 2023
Last updated
Mar 14, 2024
xml2js versions before 0.5.0 allows an external attacker to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the
__proto__
property to be edited.References