stackexchange uses an unpached version of jQuery < 3.4.0 which exposes it to prototype pollution in stackexchange/dnscontrol
Jul 12th 2022
By adding or modifying attributes of an object prototype, it is possible to create attributes that exist on every object, or replace critical attributes with malicious ones.
This can be problematic if the software depends on existence or non-existence of certain attributes, or uses pre-defined attributes of object prototype (such as hasOwnProperty, toString or valueOf)
- Integrity: An attacker can inject attributes that are used in other components.
- Availability: An attacker can override existing attributes with ones that have incompatible type, which may lead to a crash.