Description
xml2js version 0.4.23 allows an external attacker to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the __proto__ property to be edited.
Remediation
References
https://fluidattacks.com/advisories/myers/
https://github.com/Leonidas-from-XIV/node-xml2js/
https://lists.debian.org/debian-lts-announce/2024/03/msg00013.html
Related Vulnerabilities
CVE-2022-31367 Vulnerability in npm package strapi-plugin-content-manager
CVE-2023-40345 Vulnerability in maven package org.jenkins-ci.plugins:delphix
CVE-2020-7661 Vulnerability in npm package url-regex
CVE-2022-31160 Vulnerability in maven package org.webjars.bower:jquery-ui
CVE-2021-41532 Vulnerability in maven package org.apache.ozone:ozone-recon