298,930
Total vulnerabilities in the database
Prototype pollution potential with the utility function rollbar/src/utility.set(). No impact when using the published public interface.
If application code directly imports set from rollbar/src/utility and then calls set with untrusted input in the second argument, it is vulnerable to prototype pollution.
POC:
const obj = {};
require("rollbar/src/utility").set(obj, "__proto__.polluted", "vulnerable");
console.log({}.polluted !== undefined ? '[POLLUTION_TRIGGERED]':'');
Fixed in version 2.26.5 and 3.0.0-beta5.
If application code directly imports set from rollbar/src/utility, ensure that the second argument does not receive untrusted input.
https://github.com/rollbar/rollbar.js/issues/1333#issuecomment-3353720946