logo

CVE-2022-23631 superjson

Package

Manager: npm
Name: superjson
Vulnerable Version: >=0 <1.8.1

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.00398 pctl0.59794

Details

Prototype Pollution leading to Remote Code Execution in superjson ### Impact This is critical vulnerability, as it allows to run arbitrary code on any server using superjson input, including a Blitz.js server, without prior authentication or knowledge. Attackers gain full control over the server so they could steal and manipulate data or attack further systems. The only requirement is that the server implements at least one endpoint which uses superjson during request processing. In the case of Blitz.js, it would be at least one RPC call. ### Patches This has been patched in superjson 1.8.1 and Blitz.js 0.45.3. If you are unable to upgrade to Blitz.js 0.45.3 in a timely manner, you can instead upgrade only superjson to version 1.8.1 using yarn resolutions are similar. Blitz versions < 0.45.3 are only affected because they used superjson versions < 1.8.1. ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/blitz-js/superjson * Email us at b@bayer.ws ### References * https://www.sonarsource.com/blog/blitzjs-prototype-pollution/

Metadata

Created: 2022-02-09T22:20:49Z
Modified: 2023-10-23T19:20:21Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-5888-ffcr-r425/GHSA-5888-ffcr-r425.json
CWE IDs: ["CWE-1321", "CWE-94"]
Alternative ID: GHSA-5888-ffcr-r425
Finding: F390
Auto approve: 1