Vulnerabilities/

Prototype Pollution Protection Bypass in qs

Severity:
High

Description

Affected version of qs are vulnerable to Prototype Pollution because it is possible to bypass the protection. The qs.parse function fails to properly prevent an object’s prototype to be altered when parsing arbitrary input. Input containing [ or ] may bypass the prototype pollution protection and alter the Object prototype.

Recommendation

Update the qs package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
qs
Anything's wrong? Let us know Last updated on January 09, 2023

This issue is available in SmartScanner Professional

See Pricing