CVE-2023-36665: protobufjs Prototype Pollution vulnerability
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.81312%
CWE
Published
7/5/2023
Updated
6/28/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
protobufjs | npm | >= 6.10.0, < 6.11.4 | 6.11.4 |
protobufjs | npm | >= 7.0.0, < 7.2.5 | 7.2.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from four primary vectors: 1) util.setProperty
lacked prototype protection checks (fixed in e66379f), 2) setParsedOption
accepts untrusted paths, 3) parse()
handles raw protobuf messages with embedded options, and 4) load/loadSync
process schema definitions. All were explicitly listed in vulnerability descriptions and patched versions add prototype access checks. The commit diff shows prototype protection added to util.setProperty
, and advisory examples demonstrate exploitation through these entry points.