Skip to content

[GHSA-66ff-xgx4-vchm] protobuf.js: Code injection through bytes field defaults in generated toObject code#7689

Open
tijuks wants to merge 2 commits into
tijuks/advisory-improvement-7689from
tijuks-GHSA-66ff-xgx4-vchm
Open

[GHSA-66ff-xgx4-vchm] protobuf.js: Code injection through bytes field defaults in generated toObject code#7689
tijuks wants to merge 2 commits into
tijuks/advisory-improvement-7689from
tijuks-GHSA-66ff-xgx4-vchm

Conversation

@tijuks
Copy link
Copy Markdown

@tijuks tijuks commented May 14, 2026

Updates

  • Affected products

Comments
Improve

@github
Copy link
Copy Markdown
Collaborator

github commented May 14, 2026

Hi there @dcodeIO! A community member has suggested an improvement to your security advisory. If approved, this change will affect the global advisory listed at github.com/advisories. It will not affect the version listed in your project repository.

This change will be reviewed by our Security Curation Team. If you have thoughts or feedback, please share them in a comment here! If this PR has already been closed, you can start a new community contribution for this advisory

@github-actions github-actions Bot changed the base branch from main to tijuks/advisory-improvement-7689 May 14, 2026 05:26
@github
Copy link
Copy Markdown
Collaborator

github commented May 15, 2026

Hi there @dcodeIO! A community member has suggested an improvement to your security advisory. If approved, this change will affect the global advisory listed at github.com/advisories. It will not affect the version listed in your project repository.

This change will be reviewed by our Security Curation Team. If you have thoughts or feedback, please share them in a comment here! If this PR has already been closed, you can start a new community contribution for this advisory

@dcodeIO
Copy link
Copy Markdown

dcodeIO commented May 15, 2026

This proposed change is wrong and should be rejected.

The advisory is about code injection in protobufjs generated toObject code via schema-controlled bytes defaults. There is no LDAP query handling here, and no communication-channel source verification issue. Adding CWE-90 and CWE-940 is unsupported, and the expanded summary is generic CWE text that misrepresents the vulnerability.

I am blocking this as invalid, and I would appreciate not being pinged again for unsupported advisory edits of this kind.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants