Skip to content

Conversation

@murphys0709
Copy link

A security issue was discovered in protobuf.js in 6.10.0 until 6.11.4 and 7.0.0 until 7.2.4, where a user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty

grpc/grpc-js 1.7.3 was dependent on an outdated version of protobuf.js. By incrementing grpc/grpc-js from 1.7.3 to 1.12.4, we also increment protobufjs from 7.1.2 to 7.4.0, resolving the security issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant