You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Snyk Description: ## Overview qs is a querystring parser that supports nesting and arrays, with a depth limit.
Affected versions of this package are vulnerable to Prototype Override Protection Bypass. By default qs protects against attacks that attempt to overwrite an object's existing prototype properties, such as toString(), hasOwnProperty(),etc.
By default parameters that would overwrite properties on the object prototype are ignored, if you wish to keep the data from those fields either use plainObjects as mentioned above, or set allowPrototypes to true which will allow user input to overwrite those properties. WARNING It is generally a bad idea to enable this option as it can cause problems when attempting to use the properties that have been overwritten. Always be careful with this option.
Overwriting these properties can impact application logic, potentially allowing attackers to work around security controls, modify data, make the application unstable and more.
In versions of the package affected by this vulnerability, it is possible to circumvent this protection and overwrite prototype properties and functions by prefixing the name of the parameter with [ or ]. e.g. qs.parse("]=toString") will return {toString = true}, as a result, calling toString() on the object will throw an exception.
Package Name: qs
Package Version: ['6.2.0', '2.2.4', '1.2.2']
Package Manager: npm
Target File: package.json
Severity Level: high
Snyk ID: npm:qs:20170213
Snyk CVE: CVE-2017-1000048
Snyk CWE: CWE-20
Link to issue in Snyk: https://app.snyk.io/org/rhicksiii91/project/93ddcac2-4d2c-43e7-b383-b47b30846d11
Snyk Description: ## Overview
qs is a querystring parser that supports nesting and arrays, with a depth limit.
Affected versions of this package are vulnerable to Prototype Override Protection Bypass. By default
qs
protects against attacks that attempt to overwrite an object's existing prototype properties, such astoString()
,hasOwnProperty()
,etc.From
qs
documentation:Overwriting these properties can impact application logic, potentially allowing attackers to work around security controls, modify data, make the application unstable and more.
In versions of the package affected by this vulnerability, it is possible to circumvent this protection and overwrite prototype properties and functions by prefixing the name of the parameter with
[
or]
. e.g.qs.parse("]=toString")
will return{toString = true}
, as a result, callingtoString()
on the object will throw an exception.Example:
For more information, you can check out our blog.
Disclosure Timeline
6.0.3
,6.1.1
,6.2.2
,6.3.1
.6.4.0
,6.3.2
,6.2.3
,6.1.2
and6.0.4
Remediation
Upgrade
qs
to version 6.0.4, 6.1.2, 6.2.3, 6.3.2 or higher.References
The text was updated successfully, but these errors were encountered: