Description
xml2js version 0.4.23 allows an external attacker to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the __proto__ property to be edited.
Remediation
References
https://fluidattacks.com/advisories/myers/
https://github.com/Leonidas-from-XIV/node-xml2js/
https://lists.debian.org/debian-lts-announce/2024/03/msg00013.html
Related Vulnerabilities
CVE-2023-50571 Vulnerability in maven package org.jeasy:easy-rules-mvel
CVE-2021-41167 Vulnerability in npm package modern-async
CVE-2017-16114 Vulnerability in maven package org.webjars.npm:marked
CVE-2023-29208 Vulnerability in maven package org.xwiki.platform:xwiki-platform-oldcore
CVE-2022-4725 Vulnerability in maven package com.amazonaws:aws-android-sdk-core