SB2024090207 - Prototype pollution in timdown rangy
Published: September 2, 2024 Updated: November 6, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Prototype pollution (CVE-ID: CVE-2023-26102)
The vulnerability allows a remote attacker to execute arbitrary JavaScript code.
The vulnerability exists due to improper input validation in extend() function in file rangy-core.js. A remote attacker can pass specially crafted input to the application and perform prototype pollution, which can result in information disclosure or data manipulation.
Remediation
Install update from vendor's website.