Description
qs before 6.10.3 allows attackers to cause a Node process hang because an __ proto__ key can be used. In many typical web framework use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000.
Recommendation
Update the qs package to the latest compatible version. Followings are version details:
Affected version(s): **< 6.2.4 >= 6.3.0, < 6.3.3 >= 6.4.0, < 6.4.1 >= 6.5.0, < 6.5.3 >= 6.6.0, < 6.6.1 >= 6.7.0, < 6.7.3 >= 6.8.0, < 6.8.3 >= 6.9.0, < 6.9.7 >= 6.10.0, < 6.10.3** Patched version(s): **6.2.4 6.3.3 6.4.1 6.5.3 6.6.1 6.7.3 6.8.3 6.9.7 6.10.3**
References
Related Issues
- thlorenz browserify-shim vulnerable to prototype pollution - CVE-2022-37617
- Grunt-karma vulnerable to prototype pollution - CVE-2022-37602
- thlorenz browserify-shim vulnerable to prototype pollution (GHSA-r737-347m-wqc7) - CVE-2022-37621
- steal vulnerable to Prototype Pollution via alias variable - CVE-2022-37265
- Tags:
- npm
- qs
Anything's wrong? Let us know Last updated on April 29, 2025