This is a very underated and less known vulnerability that happens most commonly in Javascript based applications and is specially dangrous when its running on the backend servers (Node.Js being the most common culprit).
This mainly happens due to how JS works and its prototype based nature as when new objects are created they carry over properties and methods of the prototype object. (Ex. toString, constructor). This provides a lot of flexibility to Javascript but at the same time, makes it vulnerable.
For Ex. a malicious actor can make application wide changes which will effect all objects and they dont even need to directly modify the object they can access it through the __proto__
property of a js object and once that object is changed all objects in the applications have that change applied to them.
A lot of the common attacks against this vulnerability involve adding properties and methods to manipulate the application flow.
PortSwigger Prototype Pollution: https://portswigger.net/daily-swig/prototype-pollution-the-dangerous-and-underrated-vulnerability-impacting-javascript-applications
AST Injection, Prototype Pollution to RCE : https://blog.p6.is/AST-Injection/#Exploit
Link: https://i.ytimg.com/vi/CkIfJtVqDbY/maxresdefault.jpg | From the show Tokyo Revengers