Summary
The makerjs.extendObject function copies properties from source objects without proper validation, potentially exposing applications to security risks. The function lacks hasOwnProperty() checks and does not filter dangerous keys, allowing inherited properties and potentially malicious properties to be copied to target objects.
Details
The extendObject function iterates over source object properties using a for...in loop without:
- Checking
hasOwnProperty() to exclude inherited properties
- Filtering dangerous keys (
__proto__, constructor, prototype)
- Validating property sources
Affected Code
File: https://github.com/microsoft/maker.js/blob/98cffa82a372ff942194c925a12a311253587167/packages/maker.js/src/core/maker.ts#L232-L241
PoC
const makerjs = require('makerjs');
const source = { __proto__: { name: 'Ravi', isAdmin: true } };
const target = { name: 'user' };
const result = makerjs.extendObject(target, source);
console.log(result.name); // Ravi
console.log(result.isAdmin); // true
Impact
Security Implications
-
Unexpected Behavior: Properties may appear on target objects but not be own properties, breaking hasOwnProperty() assumptions in security-sensitive code.
-
Security Bypass Risk: Code relying on hasOwnProperty() for validation could be bypassed.
-
Future Risk: Lack of dangerous key filtering (__proto__, constructor, prototype) exposes potential attack vectors.
Affected Use Cases
- Extending objects from user input or external APIs
- Merging options from untrusted sources
References
Summary
The
makerjs.extendObjectfunction copies properties from source objects without proper validation, potentially exposing applications to security risks. The function lackshasOwnProperty()checks and does not filter dangerous keys, allowing inherited properties and potentially malicious properties to be copied to target objects.Details
The
extendObjectfunction iterates over source object properties using afor...inloop without:hasOwnProperty()to exclude inherited properties__proto__,constructor,prototype)Affected Code
File: https://github.com/microsoft/maker.js/blob/98cffa82a372ff942194c925a12a311253587167/packages/maker.js/src/core/maker.ts#L232-L241
PoC
Impact
Security Implications
Unexpected Behavior: Properties may appear on target objects but not be own properties, breaking
hasOwnProperty()assumptions in security-sensitive code.Security Bypass Risk: Code relying on
hasOwnProperty()for validation could be bypassed.Future Risk: Lack of dangerous key filtering (
__proto__,constructor,prototype) exposes potential attack vectors.Affected Use Cases
References