CVE-2023-26102

All versions of the package rangy are vulnerable to Prototype Pollution when using the extend() function in file rangy-core.js.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype
References
Link Resource
https://github.com/timdown/rangy/issues/478 Exploit Issue Tracking Third Party Advisory
https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702 Exploit Third Party Advisory
https://github.com/timdown/rangy/issues/478 Exploit Issue Tracking Third Party Advisory
https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:rangy_project:rangy:-:*:*:*:*:node.js:*:*

History

No history.

Information

Published : 2023-02-24 05:15

Updated : 2025-03-11 16:15


NVD link : CVE-2023-26102

Mitre link : CVE-2023-26102

CVE.ORG link : CVE-2023-26102


JSON object : View

Products Affected

rangy_project

  • rangy
CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')