Prototype Pollution – Is this effective only for the Global objects?

I recently found a prototype pollution vulnerability in an open-source project.
The code was something like this:
var a = {}
var b = JSON.parse(‘some_user_input_where_payload_can_be_sent’)
// consider b = JSON.parse(‘{"__proto__"… Continue reading Prototype Pollution – Is this effective only for the Global objects?

What is the significance of an app leaking its access token – knowingly/unknowingly with just read access

I am doing a research on an app which has some secret ID. I see that the source code of the app has the secret ID hardcoded inside and the API to request for the access token has just this Secret ID as its query parameter. So ideally it is… Continue reading What is the significance of an app leaking its access token – knowingly/unknowingly with just read access

Escalating prototype pollution vulnerability in an application

I recently found a prototype pollution vulnerability in an application using nodejs and am trying to write an exploit for the same.
I did a simple exploit by using the usual isAdmin flag which is mentioned in a lot of blogs/writeups, etc a… Continue reading Escalating prototype pollution vulnerability in an application

Prototype pollution in server instances exploit – what is the correct approach?

I am trying to perform prototype pollution exploit for a project to demonstrate the vulnerability to the owner.
So I am trying to pollute the toString() function from the user inputs.
The user input has two fields mode of contact and conta… Continue reading Prototype pollution in server instances exploit – what is the correct approach?