Hacker Newsnew | past | comments | ask | show | jobs | submit | akhs's commentslogin

Copying the most relevant section from the report:

This vulnerability is unique because it requires Zero Direct User Input.

If an attacker can pollute Object.prototype via any other library in the stack (e.g., qs, minimist, ini, body-parser), Axios will automatically pick up the polluted properties during its config merge.

Because Axios does not sanitise these merged header values for CRLF (\r\n) characters, the polluted property becomes a Request Smuggling payload.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: