Prototype pollution vulnerability in function parseQuery in parseQuery.js in webpack loader-utils via the name variable in parseQuery.js. This affects all versions prior to 1.4.1 and 2.0.3.
The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.
Link | Tags |
---|---|
https://github.com/webpack/loader-utils/blob/d9f4e23cf411d8556f8bac2d3bf05a6e0103b568/lib/parseQuery.js#L11 | product |
https://github.com/webpack/loader-utils/blob/d9f4e23cf411d8556f8bac2d3bf05a6e0103b568/lib/parseQuery.js#L47 | product |
https://github.com/webpack/loader-utils/issues/212 | issue tracking third party advisory |
https://github.com/webpack/loader-utils/issues/212#issuecomment-1319192884 | issue tracking exploit third party advisory |
https://dl.acm.org/doi/abs/10.1145/3488932.3497769 | technical description |
https://dl.acm.org/doi/pdf/10.1145/3488932.3497769 | technical description |
http://users.encs.concordia.ca/~mmannan/publications/JS-vulnerability-aisaccs2022.pdf | technical description |
https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826 | issue tracking exploit third party advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00044.html | third party advisory mailing list |