EXECUTIVE SUMMARY:
Multiple security vulnerabilities have been identified in the protobufjs library, which is used for generating JavaScript code from Protocol Buffers (protobuf) schema definitions. The affected versions include protobufjs-cli-v1.2.1, protobufjs-cli-v2.0.2, protobufjs-v7.5.6, and protobufjs-v8.0.2. These vulnerabilities can be exploited to cause code injection, arbitrary code execution, and denial of service. The vulnerabilities can be exploited when an attacker can provide or influence protobuf schemas or JSON descriptors. This can include cases where an application loads or parses protobuf schemas from untrusted sources. The attacker can craft a schema or descriptor that contains malicious option paths or default values, which can then be used to inject malicious code or cause a denial of service.[/subscribe_to_unlock_form]
EXECUTIVE SUMMARY:
Multiple security vulnerabilities have been identified in the protobufjs library, which is used for generating JavaScript code from Protocol Buffers (protobuf) schema definitions. The affected versions include protobufjs-cli-v1.2.1, protobufjs-cli-v2.0.2, protobufjs-v7.5.6, and protobufjs-v8.0.2. These vulnerabilities can be exploited to cause code injection, arbitrary code execution, and denial of service. The vulnerabilities can be exploited when an attacker can provide or influence protobuf schemas or JSON descriptors. This can include cases where an application loads or parses protobuf schemas from untrusted sources. The attacker can craft a schema or descriptor that contains malicious option paths or default values, which can then be used to inject malicious code or cause a denial of service.[emaillocker id="1283"]
The use of untrusted protobuf schemas or JSON descriptors to decode untrusted protobuf messages can lead to exploitation of these vulnerabilities. Applications that use bundled, generated, or otherwise trusted schemas are not directly affected. However, if an attacker can influence or control the schema or descriptor used by the application, they can exploit these vulnerabilities to gain unauthorized access to sensitive data or disrupt business operations.
RECOMMENDATION:
REFERENCES:
The following reports contain further technical details:
https://github.com/advisories/GHSA-6r35-46g8-jcw9
https://github.com/advisories/GHSA-66ff-xgx4-vchm
https://github.com/advisories/GHSA-75px-5xx7-5xc7
https://github.com/advisories/GHSA-jvwf-75h9-cwgg