Critical flaw in Protobuf library enables JavaScript code execution
Posted by Brajeshwar 1 day ago
Comments
Comment by gnabgib 1 day ago
Comment by lioeters 1 day ago
Typical "eval is evil" issue.
Comment by skybrian 1 day ago
Comment by radicality 1 day ago
Comment by cyanydeez 1 day ago
Comment by jauco 1 day ago
Comment by cyanydeez 1 day ago
Comment by rvz 1 day ago
Comment by zbentley 1 day ago
Any platform with eval (most implementations of Python, Perl, Lisp, Scheme, PHP, Ruby, Erlang, old editions/specific libraries of Java, Haskell, and many others) seems at risk for this type of issue.
Indeed, ser/de systems in those languages--all of them--have a long history of severe CVEs similar to this one.
It's also worth noting that this vuln has to do with the library's handling of .proto schema files, not data. The unsafe eval happens when a Protobuf schema file which itself describes the format of wire/data types is uploaded, not when the wire/data types themselves are deserialized. The majority of uses of Protobuf out there (in any language) handle the schema files rarely or as trusted input.
That doesn't make it safe/mitigated by any means, but it's worth being specific.
Comment by faangguyindia 1 day ago
I've built so much stuff in this. Code i wrote a decade back still builds and runs just fine.
It's still serving in Ad tech company, response time sub 5ms, p95
Comment by occamofsandwich 1 day ago