3 pointsby akhs4 hours ago1 comment
  • akhs4 hours ago
    Copying the most relevant section from the report:

    This vulnerability is unique because it requires Zero Direct User Input.

    If an attacker can pollute Object.prototype via any other library in the stack (e.g., qs, minimist, ini, body-parser), Axios will automatically pick up the polluted properties during its config merge.

    Because Axios does not sanitise these merged header values for CRLF (\r\n) characters, the polluted property becomes a Request Smuggling payload.