Source: angular.js Version: 1.5.10-1 Severity: grave Tags: security upstream Justification: user security hole
Hi, The following vulnerability was published for angular.js. CVE-2019-10768[0]: | In AngularJS before 1.7.9 the function `merge()` could be tricked into | adding or modifying properties of `Object.prototype` using a | `__proto__` payload. There is a simple POC/verifier available on [1]. angular.merge({}, JSON.parse('{"__proto__": {"xxx": "polluted"}}')); console.log(({}).xxx); If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2019-10768 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10768 [1] https://snyk.io/vuln/SNYK-JS-ANGULAR-534884 [2] https://github.com/angular/angular.js/commit/add78e62004e80bb1e16ab2dfe224afa8e513bc3 Regards, Salvatore