All versions of the package rangy are vulnerable to Prototype Pollution when using the extend() function in file rangy-core.js.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype
The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.
Link | Tags |
---|---|
https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702 | third party advisory exploit |
https://github.com/timdown/rangy/issues/478 | issue tracking exploit third party advisory |