CVE-2024-57708

5.7 MEDIUM

📋 TL;DR

This CVE describes a potential prototype pollution vulnerability in OneTrust SDK version 6.33.0 that could allow a local attacker to cause denial of service. The vulnerability involves manipulation of Object.setPrototypeOf, __proto__, and Object.assign components. Note: The vendor disputes this is actually a prototype pollution vulnerability.

💻 Affected Systems

Products:
  • OneTrust SDK
Versions: 6.33.0
Operating Systems: All platforms running JavaScript
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the specific vulnerable version of OneTrust SDK. The vulnerability requires local access to execute.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service for applications using the affected SDK, potentially crashing JavaScript execution contexts.

🟠

Likely Case

Local denial of service affecting specific functionality using the OneTrust SDK components.

🟢

If Mitigated

Minimal impact if proper input validation and sandboxing are implemented.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system. Proof of concept details are available in the referenced GitHub advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.34.0 or later

Vendor Advisory: https://github.com/brotheralameen1/Discordforschool/security/advisories/GHSA-63xr-98vc-whx5

Restart Required: No

Instructions:

1. Update OneTrust SDK to version 6.34.0 or later. 2. Replace the vulnerable script file with the patched version. 3. Clear browser caches if used in web applications.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement strict input validation for objects passed to Object.setPrototypeOf and Object.assign methods

Restrict Local Access

all

Implement proper access controls to limit local user privileges

🧯 If You Can't Patch

  • Implement network segmentation to isolate affected systems
  • Monitor for abnormal JavaScript execution patterns

🔍 How to Verify

Check if Vulnerable:

Check if your application includes OneTrust SDK version 6.33.0 by examining script references or package dependencies.

Check Version:

Check the script URL or package.json for OneTrust SDK version

Verify Fix Applied:

Verify that OneTrust SDK version is 6.34.0 or later and test the affected functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript errors related to prototype manipulation
  • Multiple failed attempts to modify object prototypes

Network Indicators:

  • Local network traffic attempting to exploit the vulnerability

SIEM Query:

Search for logs containing 'Object.setPrototypeOf', '__proto__', or 'Object.assign' errors in JavaScript contexts

🔗 References

📤 Share & Export