Prototype Pollution in mithril
High severity
GitHub Reviewed
Published
Sep 3, 2020
to the GitHub Advisory Database
•
Updated Jan 9, 2023
Description
Reviewed
Aug 31, 2020
Published to the GitHub Advisory Database
Sep 3, 2020
Last updated
Jan 9, 2023
Affected versions of
mithril
are vulnerable to prototype pollution. The functionparseQueryString
may allow a malicious user to modify the prototype ofObject
, causing the addition or modification of an existing property that will exist on all objects. A payload such as__proto__%5BtoString%5D=123
in the query string would change thetoString()
function to123
.Recommendation
If you are using mithril 2.x, upgrade to version 2.0.2 or later.
If you are using mithril 1.x, upgrade to version 1.1.7 or later.
References