-
Notifications
You must be signed in to change notification settings - Fork 583
[GHSA-mwv9-gp5h-frr4] Sveltejs devalue's devalue.parse and devalue.unflatten emit objects with __proto__ own properties
#7464
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: Wenxin-Jiang/advisory-improvement-7464
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
| @@ -1,15 +1,15 @@ | ||||||
| { | ||||||
| "schema_version": "1.4.0", | ||||||
| "id": "GHSA-mwv9-gp5h-frr4", | ||||||
| "modified": "2026-03-12T16:38:15Z", | ||||||
| "modified": "2026-03-12T19:41:57Z", | ||||||
| "published": "2026-03-12T16:38:15Z", | ||||||
| "aliases": [], | ||||||
| "summary": "Sveltejs devalue's `devalue.parse` and `devalue.unflatten` emit objects with `__proto__` own properties", | ||||||
| "details": "In some circumstances, `devalue.parse` and `devalue.unflatten` could emit objects with `__proto__` own properties. This in and of itself is not a security vulnerability (and is possible with, for example, `JSON.parse` as well), but it can result in prototype injection if _downstream_ code handles it incorrectly:\n\n```ts\nconst result = devalue.parse(/* input creating an object with a __proto__ property */);\nconst target = {};\nObject.assign(target, result); // target's prototype is now polluted\n```", | ||||||
| "severity": [ | ||||||
| { | ||||||
| "type": "CVSS_V4", | ||||||
| "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U" | ||||||
| "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" | ||||||
| } | ||||||
| ], | ||||||
| "affected": [ | ||||||
|
|
@@ -23,7 +23,7 @@ | |||||
| "type": "ECOSYSTEM", | ||||||
| "events": [ | ||||||
| { | ||||||
| "introduced": "0" | ||||||
| "introduced": "4.0.0" | ||||||
| }, | ||||||
| { | ||||||
| "fixed": "5.6.4" | ||||||
|
|
@@ -54,7 +54,7 @@ | |||||
| "cwe_ids": [ | ||||||
| "CWE-1321" | ||||||
| ], | ||||||
| "severity": "LOW", | ||||||
| "severity": "MODERATE", | ||||||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. We do not accept this modification. For reference,
(emphasis added)
Suggested change
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Hi @elliott-with-the-longest-name-on-github, thanks for the quick response! Please see my comment below about the CVSS changes. This was not intentional and I agree that the severity should not be changed. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Yeah, sorry, I meant to submit both of my comments as one review. Looks like GHSA assigned a "ghost string" or something on the backend; we didn't even give it a CVSS score in the first place. Thanks for fixing the starting version!
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. No problem at all! I don’t think I’m able to directly modify those files in the PR, so please feel free to make those changes. If the starting version looks good to you, feel free to merge the PR after fixing the CVSS issue. Thank you for looking at this so quickly! |
||||||
| "github_reviewed": true, | ||||||
| "github_reviewed_at": "2026-03-12T16:38:15Z", | ||||||
| "nvd_published_at": null | ||||||
|
|
||||||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not actually sure why there's a CVSS string here in the first place; it is not present in the original advisory:
We purposefully statically scored this as a LOW as we do not consider it to be an actual security issue.