We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
This is a bypass of CVE-2020-8136 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8136). By providing a name=constructor property it is still possible to crash the application. The original fix only checks for the key __proto__ (#116).
name=constructor
__proto__
All users are recommended to upgrade
v5.3.1 includes a patch
No workarounds are possible.
Read up https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/
If you have any questions or comments about this advisory:
Impact
This is a bypass of CVE-2020-8136 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8136).
By providing a
name=constructor
property it is still possible to crash the application.The original fix only checks for the key
__proto__
(#116).All users are recommended to upgrade
Patches
v5.3.1 includes a patch
Workarounds
No workarounds are possible.
References
Read up https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/
For more information
If you have any questions or comments about this advisory: