qs vulnerable to Prototype Pollution
High severity
GitHub Reviewed
Published
Nov 27, 2022
to the GitHub Advisory Database
•
Updated Feb 13, 2024
Package
Affected versions
>= 6.10.0, < 6.10.3
>= 6.9.0, < 6.9.7
>= 6.8.0, < 6.8.3
>= 6.7.0, < 6.7.3
>= 6.6.0, < 6.6.1
>= 6.5.0, < 6.5.3
>= 6.4.0, < 6.4.1
>= 6.3.0, < 6.3.3
< 6.2.4
Patched versions
6.10.3
6.9.7
6.8.3
6.7.3
6.6.1
6.5.3
6.4.1
6.3.3
6.2.4
Description
Published by the National Vulnerability Database
Nov 26, 2022
Published to the GitHub Advisory Database
Nov 27, 2022
Reviewed
Dec 6, 2022
Last updated
Feb 13, 2024
qs before 6.10.3 allows attackers to cause a Node process hang because an
__ proto__
key can be used. In many typical web framework use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such asa[__proto__]=b&a[__proto__]&a[length]=100000000
. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4.References