#VU96657 Prototype pollution in rangy - CVE-2023-26102

 

#VU96657 Prototype pollution in rangy - CVE-2023-26102

Published: September 2, 2024 / Updated: November 6, 2024


Vulnerability identifier: #VU96657
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2023-26102
CWE-ID: CWE-1321
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
rangy
Software vendor:
timdown

Description

The vulnerability allows a remote attacker to execute arbitrary JavaScript code.

The vulnerability exists due to improper input validation in extend() function in file rangy-core.js. A remote attacker can pass specially crafted input to the application and perform prototype pollution, which can result in information disclosure or data manipulation.


Remediation

Install update from vendor's website.

External links