Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2022-37621/ Prototype pollution found in resolve-shims.js #247

Closed
secdevlpr26 opened this issue Oct 27, 2022 · 3 comments
Closed

CVE-2022-37621/ Prototype pollution found in resolve-shims.js #247

secdevlpr26 opened this issue Oct 27, 2022 · 3 comments

Comments

@secdevlpr26
Copy link

Prototype pollution vulnerability in function resolveShims in resolve-shims.js in thlorenz browserify-shim 3.8.15 via the fullPath variable in resolve-shims.js.

The prototype pollution vulnerability can be mitigated with several best practices described here: [https://learn.snyk.io/lessons/prototype-pollution/javascript/]

@bendrucker
Copy link
Collaborator

Not going to continue accepting these automated or at least non-interactive reports for pollution that doesn't even effect global prototypes.

@secdevlpr26
Copy link
Author

Hello,
Sorry for all the inconvenience caused. All the reports are based on the research work of my colleague (you can find her paper's link below) and I am reporting them here as per her analysis and records.

https://dl.acm.org/doi/pdf/10.1145/3488932.3497769 - This is the published paper with the Github link to her static analysis tool.
Thanks

@bendrucker
Copy link
Collaborator

bendrucker commented Nov 9, 2022

Ok, interesting, but the nature of security is that balancing signal and noise is critical. Performing automated analysis and then reporting non-exploitable paths as high sev vulnerabilities in public databases is a massive amount of noise. I'd argue this type of effort is a net-harm to security by wasting maintainers time and potentially obscuring exploitable vulnerabilities in a sea of inconsequential reports. You should have tested and iterated on your methodology for outreach before mass-spamming these reports as well as been honest up front about the detection methodology used.

I'll be getting in touch with the research team and their supervisors to submit this complaint.

Repository owner locked and limited conversation to collaborators Nov 9, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants