Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
A vulnerability exists in the 'counterpart' library for Node.js and the browser due to insufficient sanitization of user-controlled input in translation key processing. The affected versions prior to 0.18.6 allow attackers to manipulate the library's translation functionality by supplying maliciously crafted keys containing prototype chain elements (e.g., __proto__ ), leading to prototype pollution. This weakness enables adversaries to inject arbitrary properties into the JavaScript Object prototype through the first parameter of the translate method when combined with specific separator configurations, potentially resulting in denial-of-service conditions or remote code execution in vulnerable applications. The issue arises from the library's failure to properly validate or neutralize special characters in translation key inputs before processing.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Counterpart 安全漏洞
Vulnerability Description
Counterpart是Martin Andert个人开发者的一个翻译库。 Counterpart 0.18.6之前版本存在安全漏洞,该漏洞源于对用户输入清理不足,可能导致原型污染攻击。
CVSS Information
N/A
Vulnerability Type
N/A