Files
CVEs-PoC/2021/CVE-2021-20083.md
2025-09-29 21:09:30 +02:00

23 lines
1.1 KiB
Markdown

### [CVE-2021-20083](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20083)
![](https://img.shields.io/static/v1?label=Product&message=jquery-plugin-query-object&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.2.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Prototype%20Pollution&color=brightgreen)
### Description
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-plugin-query-object 2.2.3 allows a malicious user to inject properties into Object.prototype.
### POC
#### Reference
- http://packetstormsecurity.com/files/166299/WordPress-Core-5.9.0-5.9.1-Cross-Site-Scripting.html
- https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-query-object.md
#### Github
- https://github.com/20142995/nuclei-templates
- https://github.com/B1gN0Se/prototype-pollution
- https://github.com/BlackFan/client-side-prototype-pollution
- https://github.com/retr0-13/client-side-prototype-pollution
- https://github.com/tHeStRyNg/client-side-prototype-pollution