A __proto__
pollution vulnerability exists in synchrony versions before v2.4.4. Successful exploitation could lead to arbitrary code execution.
A __proto__
pollution vulnerability exists in the [LiteralMap] transformer allowing crafted input to modify properties in the Object prototype.
When executing in Node.js, due to use of the prettier
module, defining a parser
property on __proto__
with a path to a JS module on disk causes a require
of the value which can lead to arbitrary code execution.
A fix has been released in deobfuscator@2.4.4
.
Craft a malicious input file named poc.js
as follows:
// Malicious code to be run after this file is imported. Logs the result of shell command "dir" to the console.
console.log(require('child_process').execSync('dir').toString())
// Synchrony exploit PoC
{
var __proto__ = { parser: 'poc.js' }
}
Then, run synchrony poc.js
from the same directory as the malicious file.
This vulnerability was found and disclosed by William Khem-Marquez.
{ "nvd_published_at": "2023-10-17T23:15:12Z", "cwe_ids": [ "CWE-1321" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-10-18T18:27:13Z" }