qs vulnerable to Prototype Pollution
High severity
GitHub Reviewed
Published
Nov 27, 2022
to the GitHub Advisory Database
•
Updated Apr 29, 2025
Package
Affected versions
>= 6.10.0, < 6.10.3
>= 6.9.0, < 6.9.7
>= 6.8.0, < 6.8.3
>= 6.7.0, < 6.7.3
>= 6.6.0, < 6.6.1
>= 6.5.0, < 6.5.3
>= 6.4.0, < 6.4.1
>= 6.3.0, < 6.3.3
< 6.2.4
Patched versions
6.10.3
6.9.7
6.8.3
6.7.3
6.6.1
6.5.3
6.4.1
6.3.3
6.2.4
Description
Published by the National Vulnerability Database
Nov 26, 2022
Published to the GitHub Advisory Database
Nov 27, 2022
Reviewed
Dec 6, 2022
Last updated
Apr 29, 2025
qs before 6.10.3 allows attackers to cause a Node process hang because an
__ proto__
key can be used. In many typical web framework use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such asa[__proto__]=b&a[__proto__]&a[length]=100000000
. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4.References