mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 10:41:43 +00:00
19 lines
780 B
Markdown
19 lines
780 B
Markdown
![]() |
### [CVE-2023-26102](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26102)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
All versions of the package rangy are vulnerable to Prototype Pollution when using the extend() function in file rangy-core.js.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://github.com/timdown/rangy/issues/478
|
||
|
- https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702
|
||
|
|
||
|
#### Github
|
||
|
No PoCs found on GitHub currently.
|
||
|
|