cve/2023/CVE-2023-26102.md

19 lines
780 B
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-26102](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26102)
![](https://img.shields.io/static/v1?label=Product&message=rangy&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20*%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Prototype%20Pollution&color=brighgreen)
### Description
All versions of the package rangy are vulnerable to Prototype Pollution when using the extend() function in file rangy-core.js.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype
### POC
#### Reference
- https://github.com/timdown/rangy/issues/478
- https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702
#### Github
No PoCs found on GitHub currently.