rangy vulnerable to Prototype Pollution
High severity
GitHub Reviewed
Published
Feb 24, 2023
to the GitHub Advisory Database
•
Updated Mar 3, 2023
Description
Published by the National Vulnerability Database
Feb 24, 2023
Published to the GitHub Advisory Database
Feb 24, 2023
Reviewed
Feb 24, 2023
Last updated
Mar 3, 2023
All versions of the package rangy are vulnerable to Prototype Pollution when using the
extend()
function in filerangy-core.js
.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype.References