Description
xml2js version 0.4.23 allows an external attacker to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the __proto__ property to be edited.
Remediation
References
https://fluidattacks.com/advisories/myers/
https://github.com/Leonidas-from-XIV/node-xml2js/
https://lists.debian.org/debian-lts-announce/2024/03/msg00013.html
Related Vulnerabilities
CVE-2021-4264 Vulnerability in maven package org.webjars:dustjs-linkedin
CVE-2020-13822 Vulnerability in maven package org.webjars.npm:elliptic
CVE-2023-49398 Vulnerability in maven package com.jfinal:jfinal
CVE-2022-25936 Vulnerability in npm package servst
CVE-2013-6397 Vulnerability in maven package org.apache.solr:solr-velocity