We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
This is a bypass of CVE-2020-8136 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8136). By providing a name=constructor property it is still possible to crash the application. The original fix only checks for the key __proto__ (#116).
name=constructor
__proto__
All users are recommended to upgrade
v5.3.1 includes a patch
No workarounds are possible.
Read up https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/
If you have any questions or comments about this advisory:
Impact
This is a bypass of CVE-2020-8136 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8136).
By providing a
name=constructor
property it is still possible to crash the application.The original fix only checks for the key
__proto__
(#116).All users are recommended to upgrade
Patches
v5.3.1 includes a patch
Workarounds
No workarounds are possible.
References
Read up https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/
For more information
If you have any questions or comments about this advisory: