Prototype pollution in aurelia-path
Description
Published by the National Vulnerability Database
Sep 27, 2021
Reviewed
Sep 27, 2021
Published to the GitHub Advisory Database
Sep 27, 2021
Last updated
Feb 1, 2023
Impact
The vulnerability exposes Aurelia application that uses
aurelia-path
package to parse a string. The majority of this will be Aurelia applications that employ theaurelia-router
package. An example is this could allow an attacker to change the prototype of base object classObject
by tricking an application to parse the following URL:https://aurelia.io/blog/?__proto__[asdf]=asdf
Patches
The problem should be patched in version
1.1.7
. Any version earlier than this is vulnerable.Workarounds
A partial work around is to free the Object prototype:
References