-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Updated axios #97
base: master
Are you sure you want to change the base?
Updated axios #97
Conversation
99c17de
to
8b084e1
Compare
8b084e1
to
90ec1f2
Compare
90ec1f2
to
0dfe4c6
Compare
0dfe4c6
to
9864fe0
Compare
867b92f
to
a8a2892
Compare
📦 Vulnerable Dependencies✍️ Summary
🔬 Research DetailsDescription: When rendering views using EJS, it is possible to bypass ejs' template injection restrictions, by abusing the
The vulnerability was rightfully disputed due to the fact that a vulnerable configuration is extremely unlikely to exist in any real-world setup. As such, the maintainers will not provide a fix for this (non-)issue. Example of a vulnerable application - const express = require('express')
const app = express()
const port = 3000
app.set('view engine', 'ejs');
app.get('/page', (req,res) => {
res.render('page', req.query); // OPTS (2nd parameter) IS ATTACKER-CONTROLLED
})
app.listen(port, () => {
console.log("Example app listening on port ${port}")
}) Contents of %%1");process.mainModule.require('child_process').execSync('calc');// In this case, sending |
db1afe8
to
39a2038
Compare
Updated axios version without a vulnerability