You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi, we are a security team. We found a prototype pollution vulnerability in your project.
The issue affects workbox-window in WorkboxEvent.
The vulnerable behavior happens because WorkboxEvent can be invoked with a controlled this context and then uses Object.assign(this, props). If this is bound to Object.prototype, global prototype pollution may occur.
Impact
An attacker may be able to pollute the global prototype and affect other objects in the same runtime.
The root cause is that attacker-controlled execution context and properties are passed into a direct object assignment targeting shared prototype objects.
Hi, we are a security team. We found a prototype pollution vulnerability in your project.
The issue affects
workbox-windowinWorkboxEvent.The vulnerable behavior happens because
WorkboxEventcan be invoked with a controlledthiscontext and then usesObject.assign(this, props). Ifthisis bound toObject.prototype, global prototype pollution may occur.Impact
An attacker may be able to pollute the global prototype and affect other objects in the same runtime.
Proof of concept
Details
We confirmed the following case:
./utils/WorkboxEvent.js:18The root cause is that attacker-controlled execution context and properties are passed into a direct object assignment targeting shared prototype objects.