-
-
Notifications
You must be signed in to change notification settings - Fork 87
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2022-37621/ Prototype pollution found in resolve-shims.js #247
Comments
Not going to continue accepting these automated or at least non-interactive reports for pollution that doesn't even effect global prototypes. |
Hello, https://dl.acm.org/doi/pdf/10.1145/3488932.3497769 - This is the published paper with the Github link to her static analysis tool. |
Ok, interesting, but the nature of security is that balancing signal and noise is critical. Performing automated analysis and then reporting non-exploitable paths as high sev vulnerabilities in public databases is a massive amount of noise. I'd argue this type of effort is a net-harm to security by wasting maintainers time and potentially obscuring exploitable vulnerabilities in a sea of inconsequential reports. You should have tested and iterated on your methodology for outreach before mass-spamming these reports as well as been honest up front about the detection methodology used. I'll be getting in touch with the research team and their supervisors to submit this complaint. |
Prototype pollution vulnerability in function resolveShims in resolve-shims.js in thlorenz browserify-shim 3.8.15 via the fullPath variable in resolve-shims.js.
The prototype pollution vulnerability can be mitigated with several best practices described here: [https://learn.snyk.io/lessons/prototype-pollution/javascript/]
The text was updated successfully, but these errors were encountered: