-
Notifications
You must be signed in to change notification settings - Fork 610
Description
Today we started getting notifications for xml2js libraries having a medium vulnerability. I'd been using an older version 0.4.19 so forced updates to the latest 0.4.23 but the vulnerability remains with the current version. I know these are often debated whether they represent real problems, but if there is a fix you could issue that would be great. Thanks in advance for your help.
The problem reported by our monitoring system (whitesource/Mend) provided this detail:
xml2js version 0.4.23 allows an external attacker to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the proto property to be edited.
It seems the fix is to disallow keys for proto from XML content to be added in the js object...
NIST just shows this as awaiting analysis: https://nvd.nist.gov/vuln/detail/CVE-2023-0842