Prototype Pollution – Is this effective only for the Global objects?

I recently found a prototype pollution vulnerability in an open-source project.
The code was something like this:
var a = {}
var b = JSON.parse(‘some_user_input_where_payload_can_be_sent’)
// consider b = JSON.parse(‘{"__proto__"… Continue reading Prototype Pollution – Is this effective only for the Global objects?

Can the data between Express.js middleware be manipulated/tampered in any way?

In the node.js express.js framework there is middleware support. Let’s assume I have two middleware – the first one, which verifies whether the JWT token is legit and not tampered with and the second middleware which doesn’t verify anymore… Continue reading Can the data between Express.js middleware be manipulated/tampered in any way?

Prototype pollution in server instances exploit – what is the correct approach?

I am trying to perform prototype pollution exploit for a project to demonstrate the vulnerability to the owner.
So I am trying to pollute the toString() function from the user inputs.
The user input has two fields mode of contact and conta… Continue reading Prototype pollution in server instances exploit – what is the correct approach?

HTTP request smuggling vulnerability in Node.js (CVE-2022-35256)

In this Help Net Security video, Austin Jones, Principal Software Engineer at ThreatX, explains what HTTP request smuggling is, and discusses a recently uncovered HTTP request smuggling vulnerability in Node.js (CVE-2022-35256). This vulnerability allo… Continue reading HTTP request smuggling vulnerability in Node.js (CVE-2022-35256)