Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-26158

CVSS 8.2 · High EPSS 0.09% · P25
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-26158

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
All versions of the package mockjs are vulnerable to Prototype Pollution via the Util.extend function due to missing check if the attribute resolves to the object prototype. By adding or modifying attributes of an object prototype, it is possible to create attributes that exist on every object, or replace critical attributes with malicious ones. This can be problematic if the software depends on existence or non-existence of certain attributes, or uses pre-defined attributes of object prototype (such as hasOwnProperty, toString or valueOf). User controlled inputs inside the extend() method of the Mock.Handler, Mock.Random, Mock.RE.Handler or Mock.Util, will allow an attacker to exploit this vulnerability. Workaround By using a denylist of dangerous attributes, this weakness can be eliminated. Add the following line in the Util.extend function: js js if (["__proto__", "constructor", "prototype"].includes(name)) continue js // src/mock/handler.js Util.extend = function extend() { var target = arguments[0] || {}, i = 1, length = arguments.length, options, name, src, copy, clone if (length === 1) { target = this i = 0 } for (; i < length; i++) { options = arguments[i] if (!options) continue for (name in options) { if (["__proto__", "constructor", "prototype"].includes(name)) continue src = target[name] copy = options[name] if (target === copy) continue if (copy === undefined) continue if (Util.isArray(copy) || Util.isObject(copy)) { if (Util.isArray(copy)) clone = src && Util.isArray(src) ? src : [] if (Util.isObject(copy)) clone = src && Util.isObject(src) ? src : {} target[name] = Util.extend(clone, copy) } else { target[name] = copy } } } return target }
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
CWE-1321
Source: NVD (National Vulnerability Database)
Vulnerability Title
Mock.js 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Mock.js是一款模拟数据生成器,旨在帮助前端攻城师独立于后端进行开发,帮助编写单元测试。 Mock.js 存在安全漏洞,该漏洞源于缺少属性检查,容易受到原型污染。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-mockjs 0 ~ * -

II. Public POCs for CVE-2023-26158

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-26158

登录查看更多情报信息。

Same Patch Batch · n/a · 2023-12-08 · 29 CVEs total

CVE-2023-65605.5 MEDIUMKernel: io_uring out of boundary memory access in __io_uaddr_map()
CVE-2023-66153.5 LOWTypecho manage-users.php information disclosure
CVE-2023-66093.5 LOWosCommerce all-products cross site scripting
CVE-2023-66142.7 LOWTypecho Page manage-pages.php backdoor
CVE-2023-66132.4 LOWTypecho Logo options-theme.php cross site scripting
CVE-2023-49487JFinalCMS 安全漏洞
CVE-2023-49486JFinalCMS 安全漏洞
CVE-2023-49485JFinalCMS 安全漏洞
CVE-2023-49484Dreamer CMS 安全漏洞
CVE-2023-49444DoraCMS 安全漏洞
CVE-2023-49443DoraCMS 安全漏洞
CVE-2023-49007NETGEAR RBR750 安全漏洞
CVE-2023-48929Franklin Electric Franklin Fueling Systems 安全漏洞
CVE-2023-48928Franklin Electric Franklin Fueling Systems 安全漏洞
CVE-2023-48122Microweber 安全漏洞
CVE-2023-46499EverShop 安全漏洞
CVE-2023-46498EverShop 安全漏洞
CVE-2023-46497EverShop 安全漏洞
CVE-2023-46496EverShop 安全漏洞
CVE-2023-46495EverShop 安全漏洞

Showing top 20 of 29 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2023-26158

No comments yet


Leave a comment