-
Notifications
You must be signed in to change notification settings - Fork 7.3k
hasOwnProperty usage #1707
Comments
Should be fixed in 0.4 as well as 0.5 |
I understand how the querystring module might be effected, but what problem do you see with the other modules? |
Debugger shouldn't be affected by this, because |
In general, any time there's an object used as a dictionary for arbitrary user-defined strings, it's a bad idea to depend on hasOwnProperty not being overridden.
Then doing |
Ok, you persuaded me. fix is coming soon |
If hasOwnProperty is overridden, then calling `obj.hasOwnProperty(prop)` can fail. Any time a dictionary of user-generated items is built, we cannot rely on hasOwnProperty being safe, so must call it from the Object.prototype explicitly.
If hasOwnProperty is overridden, then calling `obj.hasOwnProperty(prop)` can fail. Any time a dictionary of user-generated items is built, we cannot rely on hasOwnProperty being safe, so must call it from the Object.prototype explicitly.
Umm yeah, all this was the meaning behind #1637 The filename was 'injected' into the object and then later when queried bad things happened. Hey, this is "sql injection" all over again, yes? |
These should use Object.prototype.hasOwnProperty.call instead of obj.hasOwnProperty.
Causes server crashes when jerks request
/foo?hasOwnProperty=x&y=z
The text was updated successfully, but these errors were encountered: