### [CVE-2019-18954](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18954) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can manipulate internal attributes by adding additional attributes to user input. ### POC #### Reference - https://github.com/cl0udz/vulnerabilities/tree/master/pomelo-critical-state-manipulation #### Github - https://github.com/ossf-cve-benchmark/CVE-2019-18954