cve/2023/CVE-2023-45811.md

19 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-45811](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45811)
![](https://img.shields.io/static/v1?label=Product&message=synchrony&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%202.0.1%2C%20%3C%202.4.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20('Prototype%20Pollution')&color=brighgreen)
### Description
Synchrony deobfuscator is a javascript cleaner & deobfuscator. A `__proto__` pollution vulnerability exists in versions before v2.4.4. Successful exploitation could lead to arbitrary code execution. A `__proto__` pollution vulnerability exists in the `LiteralMap` transformer allowing crafted input to modify properties in the Object prototype. A fix has been released in `deobfuscator@2.4.4`. Users are advised to upgrade. Users unable to upgrade should launch node with the [--disable-proto=delete][disable-proto] or [--disable-proto=throw][disable-proto] flags
### POC
#### Reference
- https://github.com/relative/synchrony/security/advisories/GHSA-jg82-xh3w-rhxx
2024-06-09 00:33:16 +00:00
- https://github.com/relative/synchrony/security/advisories/GHSA-jg82-xh3w-rhxx
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.