This is a bypass of CVE-2020-8136 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8136).
By providing a name=constructor property it is still possible to crash the application.
The original fix only checks for the key __proto__ (https://github.com/fastify/fastify-multipart/pull/116).
All users are recommended to upgrade
v5.3.1 includes a patch
No workarounds are possible.
Read up https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/
If you have any questions or comments about this advisory: * Open an issue in https://github.com/fastify/fastify-multipart * Email us at hello@matteocollina.com
{
"github_reviewed": true,
"cwe_ids": [
"CWE-400"
],
"github_reviewed_at": "2022-02-11T18:57:53Z",
"nvd_published_at": "2022-02-11T17:15:00Z",
"severity": "HIGH"
}