| Titel | 1024bit extend-deep 0.1.6 Prototype Pollution |
|---|
| Beschreibung | The extend-deep package recursively merges objects without proper sanitization of the __proto__ property. This allows attackers to pollute the global Object.prototype, affecting all objects in the application. When a malicious object with a __proto__ property is merged, it modifies the base prototype, injecting properties that propagate to every existing and future object.
|
|---|
| Quelle | ⚠️ https://github.com/sudo-secure/security-research/blob/main/extend-deep/prototype-pollution/PoC.md |
|---|
| Benutzer | sudosme (UID 96548) |
|---|
| Einreichung | 29.03.2026 14:29 (vor 22 Tagen) |
|---|
| Moderieren | 19.04.2026 18:26 (21 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 358256 [1024bit extend-deep bis 0.1.6 index.js __proto__ Remote Code Execution] |
|---|
| Punkte | 20 |
|---|