Description
Affected versions of @polymer/polymer
are vulnerable to prototype pollution. The package fails to prevent modification of object prototypes through chart options containing a payload such as {"__proto__": {"polluted": true}}
. It is possible to achieve the same results if a chart loads data from a malicious server.
Recommendation
Update the chartkick
package to the latest compatible version. Followings are version details:
- Affected version(s): >= 3.1.0, <= 3.1.3
- Patched version(s): 3.2.0
References
Related Issues
- Cross-site Scripting in jquery-ui - CVE-2010-5312
- nuxt Code Injection vulnerability - CVE-2023-3224
- QooxDoo XSS in Callback Parameter - CVE-2011-1714
- Denial of Service in ipfs-bitswap - Vulnerability
- Tags:
- npm
- chartkick
Anything's wrong? Let us know Last updated on January 26, 2023