CVE-2023-45811

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-45811
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-45811.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-45811
Aliases
Published
2023-10-17T22:37:20.249Z
Modified
2025-12-05T00:08:38.289308Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Prototype pollution vulnerability leading to arbitrary code execution in synchrony deobfuscator
Details

Synchrony deobfuscator is a javascript cleaner & deobfuscator. A __proto__ pollution vulnerability exists in versions before v2.4.4. Successful exploitation could lead to arbitrary code execution. A __proto__ pollution vulnerability exists in the LiteralMap transformer allowing crafted input to modify properties in the Object prototype. A fix has been released in deobfuscator@2.4.4. Users are advised to upgrade. Users unable to upgrade should launch node with the [--disable-proto=delete][disable-proto] or [--disable-proto=throw][disable-proto] flags

Database specific
{
    "cwe_ids": [
        "CWE-1321"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/45xxx/CVE-2023-45811.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/relative/synchrony

Affected ranges

Type
GIT
Repo
https://github.com/relative/synchrony
Events

Affected versions

2.*

2.0.1
2.1.0
2.1.1
2.1.2
2.1.3
2.1.4
2.1.5
2.2.0
2.3.0
2.4.0
2.4.1
2.4.2
2.4.3

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-45811.json"