CVE-2022-46175

Published: Dic 24, 2022 Last Modified: Nov 21, 2024
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,1
Attack Vector: network
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: low
Availability: high

Description

AI Translation Available

JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including versions 1.0.1 and 2.2.1 does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 versions 1.0.2, 2.2.2, and later.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,3720
Percentile
1,0th
Updated

EPSS Score Trend (Last 90 Days)

1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Availability
Potential Impacts:
Read Application Data Modify Application Data Dos: Crash, Exit, Or Restart
Applicable Platforms
Languages: JavaScript
View CWE Details
Application

Json5 by Json5

Version Range Affected
To 1.0.2 (exclusive)
cpe:2.3:a:json5:json5:*:*:*:*:*:node.js:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Json5 by Json5

Version Range Affected
From 2.0.0 (inclusive)
To 2.2.2 (exclusive)
cpe:2.3:a:json5:json5:*:*:*:*:*:node.js:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Fedora by Fedoraproject

cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/json5/json5/issues/199
Issue Tracking Patch Third Party Advisory
https://github.com/json5/json5/issues/199
https://github.com/json5/json5/issues/295
Issue Tracking Third Party Advisory
https://github.com/json5/json5/issues/295
https://github.com/json5/json5/pull/298
https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h
https://lists.debian.org/debian-lts-announce/2023/11/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://github.com/json5/json5/issues/199
Issue Tracking Patch Third Party Advisory
https://github.com/json5/json5/issues/199
https://github.com/json5/json5/issues/295
Issue Tracking Third Party Advisory
https://github.com/json5/json5/issues/295
https://github.com/json5/json5/pull/298
https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h
https://lists.debian.org/debian-lts-announce/2023/11/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…