Source: angular.js
Version: 1.5.10-1
Severity: grave
Tags: security upstream
Justification: user security hole

Hi,

The following vulnerability was published for angular.js.

CVE-2019-10768[0]:
| In AngularJS before 1.7.9 the function `merge()` could be tricked into
| adding or modifying properties of `Object.prototype` using a
| `__proto__` payload.

There is a simple POC/verifier available on [1].

        angular.merge({}, JSON.parse('{"__proto__": {"xxx": "polluted"}}'));
        console.log(({}).xxx);

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-10768
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10768
[1] https://snyk.io/vuln/SNYK-JS-ANGULAR-534884
[2] 
https://github.com/angular/angular.js/commit/add78e62004e80bb1e16ab2dfe224afa8e513bc3

Regards,
Salvatore

Reply via email to