Description
Synchrony deobfuscator is a javascript cleaner & deobfuscator. A `__proto__` pollution vulnerability exists in versions before v2.4.4. Successful exploitation could lead to arbitrary code execution. A `__proto__` pollution vulnerability exists in the `LiteralMap` transformer allowing crafted input to modify properties in the Object prototype. A fix has been released in `deobfuscator@2.4.4`. Users are advised to upgrade. Users unable to upgrade should launch node with the [--disable-proto=delete][disable-proto] or [--disable-proto=throw][disable-proto] flags
Remediation
References
https://github.com/relative/synchrony/commit/b583126be94c4db7c5a478f1c5204bfb4162cf40
https://github.com/relative/synchrony/security/advisories/GHSA-jg82-xh3w-rhxx
https://github.com/relative/synchrony/security/advisories/src/transformers/literalmap.ts
Related Vulnerabilities
CVE-2020-11987 Vulnerability in maven package org.apache.xmlgraphics:batik-svgbrowser
CVE-2023-32998 Vulnerability in maven package com.rapid7:jenkinsci-appspider-plugin
CVE-2023-50730 Vulnerability in maven package edu.gemini:gsp-graphql-core_3
CVE-2023-36469 Vulnerability in maven package org.xwiki.platform:xwiki-platform-notifications-ui
CVE-2021-36374 Vulnerability in maven package org.apache.ant:ant