By sending a specially crafted request, an attacker could inject properties into existing JavaScript language construct prototypes, such as objects. Later this injection may lead to JS code execution by libraries that are vulnerable to Prototype Pollution.
Configure WAF to drop requests containing next strings: __proto__
, constructor[prototype]
, constructor.prototype
{ "nvd_published_at": "2022-01-04T20:15:00Z", "github_reviewed_at": "2022-01-04T22:46:13Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-1321", "CWE-74" ] }