Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
protobufjs: Code injection through bytes field defaults in generated toObject code
Vulnerability Description
protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs generated JavaScript for toObject conversion could include an unsafe expression derived from a schema-controlled bytes field default value. A crafted descriptor with a non-string default value for a bytes field could cause attacker-controlled code to be emitted into the generated conversion function. This vulnerability is fixed in 7.5.6 and 8.0.2.
CVSS Information
N/A
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Vulnerability Title
protobuf.js 代码注入漏洞
Vulnerability Description
protobuf.js是The protobuf.js Project开源的一个纯 JavaScript 实现,具有对node.js和浏览器的TypeScript支持的协议缓冲区实现。它易于使用,速度极快,并且通过.proto文件可以开箱即用! protobuf.js 7.5.6之前版本和8.0.2之前版本存在代码注入漏洞,该漏洞源于toObject转换生成的JavaScript包含来自模式控制字节字段默认值的不安全表达式,可能导致攻击者控制的代码被注入生成的转换函数。
CVSS Information
N/A
Vulnerability Type
N/A