-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Prototype Pollution using .parse() #60
Comments
Since GHSA-gff7-g5r8-mg8m is a thing now, maybe a ping to @wollardj could get this fixed? 😀 |
could you please update plist package to latest version (3.0.5) where this vulnerability is fully fixed? |
### Description There is a new vulnerability alert for simple-plist GHSA-gff7-g5r8-mg8m however the issue is not yet resolved from the project. For now ignore the vulnerability to unblock the CI, but we should bump the resolved version of simple-plist once [issue #60](wollardj/simple-plist#60) is resolved. ### Other changes N/A ### Tested N/A ### How others should test N/A ### Related issues N/A ### Backwards compatibility Yes
I'm re-opening this for a bit. I want to write some tests to go along with this before I cut a new release, but I won't have time until later this evening. |
Seems weird the advisory points to this module if the bug is in a dependency... |
I've just published v1.3.1 to npm (https://www.npmjs.com/package/simple-plist/v/1.3.1) and tagged it as |
Hi , I am getting the same issue in 1.3.1 version. |
@srithar21 - I'm not sure how they're able to do that. I attempted to verify their POC by adding a test for it and the underlying plist.js library throws when it detects a Less important, but also a little suspicious, their POC wouldn't work anyway because the first byte is an unexpected ASCII sequence which would have made It's entirely possible if not likely that their POC is suffering from a formatting problem, but it's still worth noting since the POC doesn't appear to be valid. Happy to be wrong about this if someone can point out something that I might be missing. |
I wonder if you need to close this GitHub issue in order to trigger the various vulnerability databases to "recheck" the vulnerability... |
Hello, does someone know the status of this issue?, it seems like it was already solved , but this issue still is open, and in all CVE references is marked as not patched |
|
@wollardj what do you think, do you want to try closing this issue to see if that triggers the vulnerability databases to mark 1.3.1 as the fixed version? |
It's worth a shot |
Still an issue here, npm audit still listing it as open with no patch |
In the future give us a shout over at https://github.com/github/advisory-database/ if we're out of date 😉 |
Hi, There's a prototype pollution vulnerability in .parse() related to the xml that are being parsed in it. In the following example the prototype pollution will affect the length parameter.
More information about the vulnerability: https://github.com/HoLyVieR/prototype-pollution-nsec18/blob/master/paper/JavaScript_prototype_pollution_attack_in_NodeJS.pdf
The text was updated successfully, but these errors were encountered: