fastest-json-copy 1.0.1 - Prototype Pollution
7,3
High
Discovered by

Offensive Team, Fluid Attacks
Summary
Full name
fastest-json-copy 1.0.1 - Prototype Pollution
Code name
State
Public
Release date
19 oct 2022
Affected product
fastest-json-copy
Affected version(s)
Version 1.0.1
Vulnerability name
Prototype Pollution
Vulnerability type
Remotely exploitable
Yes
CVSS v3.1 vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVSS v3.1 base score
7.3
Exploit available
Yes
CVE ID(s)
Description
Version 1.0.1 of fastest-json-copy allows an external attacker to edit or add new properties to an object. This is possible because the application does not correctly validate the incoming JSON keys, thus allowing the __proto__
property to be edited.
Vulnerability
Prototype pollution is a vulnerability that affects JS. It occurs when a third party manages to modify the __proto__
of an object. JavaScript first checks if such a method/attribute exists in the object. If so, then it calls it. If not, it looks in the object's prototype. If the method/attribute is also not in the object's prototype, then the property is said to be undefined.
Therefore, if an attacker succeeds in injecting the __proto__
property into an object, he will succeed in injecting or editing its properties.
Exploitation
exploit.js
Evidence of exploitation

Our security policy
We have reserved the CVE-2022-41714 to refer to this issue from now on. Disclosure policy
System Information
Version: fastest-json-copy 1.0.1
Operating System: GNU/Linux
Mitigation
There is currently no patch available for this vulnerability.
References
Vendor page https://github.com/streamich/fastest-json-copy
Timeline
IA generativa
6 oct 2022
Vendor contacted
6 oct 2022
Vendor replied
6 oct 2022
Public disclosure
19 oct 2022