Source: angular.js
Version: 1.5.10-1
Severity: grave
Tags: security upstream
Justification: user security hole
Hi,
The following vulnerability was published for angular.js.
CVE-2019-10768[0]:
| In AngularJS before 1.7.9 the function `merge()` could be tricked into
| adding or modifying properties of `Object.prototype` using a
| `__proto__` payload.
There is a simple POC/verifier available on [1].
angular.merge({}, JSON.parse('{"__proto__": {"xxx": "polluted"}}'));
console.log(({}).xxx);
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2019-10768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10768
[1] https://snyk.io/vuln/SNYK-JS-ANGULAR-534884
[2]
https://github.com/angular/angular.js/commit/add78e62004e80bb1e16ab2dfe224afa8e513bc3
Regards,
Salvatore