{"vulnerability": "CVE-2023-36665", "sightings": [{"uuid": "bee9b5c0-7649-4b1b-a32d-2a2e2da9da1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36665", "type": "seen", "source": "https://t.me/cibsecurity/65973", "content": "\u203c CVE-2023-36665 \u203c\n\nprotobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.4 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty. NOTE: this CVE Record is about \"Object.constructor.prototype. = ...;\" whereas CVE-2022-25878 was about \"Object.__proto__. = ...;\" instead.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-05T18:21:53.000000Z"}]}