Prototype pollution in ejs



Published: 2024-06-28
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-33883
CWE-ID CWE-1321
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
ejs
Other software / Other software solutions

Vendor mde (Matthew Eernisse)

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Prototype pollution

EUVDB-ID: #VU92245

Risk: High

CVSSv3.1: 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2024-33883

CWE-ID: CWE-1321 - Improperly Controlled Modification of Object Prototype Attributes (\'Prototype Pollution\')

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to improper input validation. A remote attacker can add or modify properties of Object.prototype using a __proto__ or constructor payload to execute arbitrary code on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ejs: 2.0.1 - 3.1.9

External links

http://github.com/mde/ejs/commit/e469741dca7df2eb400199e1cdb74621e3f89aa5
http://github.com/mde/ejs/compare/v3.1.9...v3.1.10
http://security.netapp.com/advisory/ntap-20240605-0003/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###