You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
UglifyJS is vulnerable to prototype pollution through trusting unsanitized user input. A remote attacker could potentially leverage this to cause property injection, altering the flow of critical data throughout the application, a denial-of-service (DoS) or potentially execute arbitrary code depending on how objects are used by an application.
Note: The vendor disputes the validity of this vulnerability, asserting:
the methodsargument is always statically determined by the method calls that exist in ast.js and therefore always under the complete control of the authors of this library.
Could you please fix the issue?
Please let me know if you need additional information.
Best regards,
Kate.
The text was updated successfully, but these errors were encountered:
UglifyJS Vulnerable to Prototype Pollution via 'DEFNODE' Function
Uglify version 3.17.4
JavaScript input
There is the BlackDuck issue
BDSA BDSA-2022-3013
[CVE-2022-37598]
Published
Oct 24, 2022
Updated
Dec 19, 2022
The link to CVE https://nvd.nist.gov/vuln/detail/CVE-2022-37598
Description:
UglifyJS is vulnerable to prototype pollution through trusting unsanitized user input. A remote attacker could potentially leverage this to cause property injection, altering the flow of critical data throughout the application, a denial-of-service (DoS) or potentially execute arbitrary code depending on how objects are used by an application.
Note: The vendor disputes the validity of this vulnerability, asserting:
the methodsargument is always statically determined by the method calls that exist in ast.js and therefore always under the complete control of the authors of this library.
Could you please fix the issue?
Please let me know if you need additional information.
Best regards,
Kate.
The text was updated successfully, but these errors were encountered: