Miggo Logo

CVE-2023-26132: dottie vulnerable to Prototype Pollution

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.37363%
Published
6/10/2023
Updated
11/29/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
dottienpm< 2.0.42.0.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

  1. The vulnerability description explicitly names the set() function. The commit diff shows prototype pollution guards added to both set() and transform() functions.
  2. The Snyk PoC demonstrates exploitation via set(), and the test cases in the commit show added protections against 'proto' manipulation in both set() and transform().
  3. The code analysis reveals both functions process user-controlled paths/keys without initial 'proto' validation, enabling prototype property injection prior to patching.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

V*rsions o* t** p**k*** *otti* ***or* *.*.* *r* vuln*r**l* to Prototyp* Pollution *u* to insu**i*i*nt ****ks, vi* t** `s*t()` *un*tion *n* t** *urr*nt v*ri**l* in t** `/*otti*.js` *il*.

Reasoning

*. T** vuln*r**ility **s*ription *xpli*itly n*m*s t** s*t() *un*tion. T** *ommit *i** s*ows prototyp* pollution *u*r*s ***** to *ot* s*t() *n* tr*ns*orm() *un*tions. *. T** Snyk Po* **monstr*t*s *xploit*tion vi* s*t(), *n* t** t*st **s*s in t** *ommi