Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Prototype Pollution via FormData Processing in Qwik City
Vulnerability Description
Qwik is a performance focused javascript framework. Prior to version 1.19.0, a prototype pollution vulnerability exists in the formToObj() function within @builder.io/qwik-city middleware. The function processes form field names with dot notation (e.g., user.name) to create nested objects, but fails to sanitize dangerous property names like __proto__, constructor, and prototype. This allows unauthenticated attackers to pollute Object.prototype by sending crafted HTTP POST requests, potentially leading to privilege escalation, authentication bypass, or denial of service. This issue has been patched in version 1.19.0.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:L
Vulnerability Type
CWE-1321
Vulnerability Title
Qwik 安全漏洞
Vulnerability Description
Qwik是Qwik Dev开源的一款微型Web框架。 Qwik 1.19.0之前版本存在安全漏洞,该漏洞源于formToObj函数存在原型污染漏洞,可能导致未经身份验证的攻击者污染Object.prototype,引发权限提升、身份验证绕过或拒绝服务。
CVSS Information
N/A
Vulnerability Type
N/A