Basic prototype pollution attacks
This lab demonstrates basic prototype pollution vulnerabilities where attackers can modify the prototype of base objects in JavaScript, leading to security issues like data manipulation and authentication bypass.
Objective: Understand how basic prototype pollution attacks work and how to exploit them.
This application processes JSON configuration data. Try to exploit prototype pollution vulnerabilities:
This lab demonstrates basic prototype pollution vulnerabilities:
__proto__ - Direct prototype accessconstructor - Constructor property accessprototype - Prototype property accessNo validation - Missing input validationThese properties can be exploited for prototype pollution:
__proto__ - Direct prototype accessconstructor - Constructor property accessprototype - Prototype property accessconstructor.prototype - Nested prototype accessThis demonstrates how prototype pollution works in JavaScript:
Use these techniques to exploit basic prototype pollution vulnerabilities: