First published: Wed Apr 05 2023(Updated: )
xml2js could allow a remote attacker to execute arbitrary code on the system, caused by a prototype pollution. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Credit: help@fluidattacks.com help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Watson Knowledge Catalog on-prem | <=4.x | |
npm/xml2js | <0.5.0 | 0.5.0 |
Xml2js Project Xml2js | =0.4.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-0842 is high, with a score of 7.3.
CVE-2023-0842 allows an attacker to edit or add new properties to an object through prototype pollution.
An attacker can exploit CVE-2023-0842 by sending a specially-crafted request.
Version 0.4.23 of xml2js and versions up to and including 4.x of IBM Watson Knowledge Catalog on-prem are affected by CVE-2023-0842.
Yes, you can find additional information about CVE-2023-0842 at the following links: [1] https://fluidattacks.com/advisories/myers/ [2] https://github.com/Leonidas-from-XIV/node-xml2js/ [3] https://exchange.xforce.ibmcloud.com/vulnerabilities/252153