Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security Vulnerabilities in Chutzpah 4.4.13 #822

Open
STMS19 opened this issue Jan 24, 2023 · 0 comments
Open

Security Vulnerabilities in Chutzpah 4.4.13 #822

STMS19 opened this issue Jan 24, 2023 · 0 comments

Comments

@STMS19
Copy link

STMS19 commented Jan 24, 2023

Description
qs before 6.10.3 allows attackers to cause a Node process hang because an __ proto__ key can be used. In many typical web framework use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[proto]=b&a[proto]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4.

Location
/Chutzpah.4.4.13/tools/Node/packages/node_modules/qs/package.json

Recommendation
Upgrade qs from 6.5.2 to 6.5.3 to fix the vulnerability.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant