Prototype pollution in aurelia-path
Description
Published by the National Vulnerability Database
Sep 27, 2021
Reviewed
Sep 27, 2021
Published to the GitHub Advisory Database
Sep 27, 2021
Last updated
Feb 1, 2023
Impact
The vulnerability exposes Aurelia application that uses
aurelia-pathpackage to parse a string. The majority of this will be Aurelia applications that employ theaurelia-routerpackage. An example is this could allow an attacker to change the prototype of base object classObjectby tricking an application to parse the following URL:https://aurelia.io/blog/?__proto__[asdf]=asdfPatches
The problem should be patched in version
1.1.7. Any version earlier than this is vulnerable.Workarounds
A partial work around is to free the Object prototype:
References