Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security Issues #19

Open
Capta1nRaj opened this issue Oct 7, 2023 · 0 comments
Open

Security Issues #19

Capta1nRaj opened this issue Oct 7, 2023 · 0 comments

Comments

@Capta1nRaj
Copy link

When I try to run GitHub Code scanning, it shows me these 2 errors:-

Exposure of Sensitive Information in simple-get:- In versions of simple-get prior to 4.0.1, 3.1.1, and 2.8.2, when fetching a remote url with a cookie location response, headers will be followed, potentially resulting in an exposure of the session cookie to a third party.

Prototype Pollution in Ajv:- An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)

I think need to update simple-get to 3.1.1, & ajv to 6.12.3.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant