CVE-2017-16129 – Prototype pollution
Severity: None2025-12-19
Abstract
The HTTP client module superagent is vulnerable to ZIP bomb attacks. In a ZIP bomb attack, the HTTP server replies with a compressed response that becomes several magnitudes larger once uncompressed. If a client does not take special care when processing such responses, it may result in excessive CPU and/or memory consumption. An attacker might exploit such a weakness for a DoS attack. To exploit this the attacker must control the location (URL) that superagent makes a request to.
The Oxygen products incorporate the superagent library as a third‑party component. This advisory was opened to address the potential impact of this third‑party library’s vulnerability.
Affected Products/Versions
| Product | Severity | Fixed Release Availability |
| Oxygen Content Fusion v8.0 and older | None | Oxygen Content Fusion 8.1 build 2025042315 |
Detail
CVE-2017-16129
Severity: High
CVSS Score: 7.1
CVE-2017-16129 is a prototype pollution vulnerability in the Async library affecting versions before 2.6.4 and 3.x before 3.2.2. An attacker may abuse the mapValues() method to inject properties (for example via __proto__) into objects created by the iterator, potentially altering application behavior or escalating privileges depending on how polluted objects are later used.
Oxygen Content Fusion is not affected. Analysis of our usage shows no exploitable path.
Starting with Oxygen Content Fusionversion 8.1 build 2025042315 the dependency was upgraded to a non-vulnerable version.
