You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
either use bourne or port it's proto inspection regex into our jsonx util
this security issue isn't exploitable by default. it requires mallicious user input to be parsed and then assigned via object.assign() for the payload to become activated. This isn't a super common workflow, but This proposed fix would make the risk moot.
The text was updated successfully, but these errors were encountered:
as shown here, json.parse() has exploit possibility: https://github.com/hapijs/bourne
either use
bourne
or port it's proto inspection regex into ourjsonx
utilthis security issue isn't exploitable by default. it requires mallicious user input to be parsed and then assigned via
object.assign()
for the payload to become activated. This isn't a super common workflow, but This proposed fix would make the risk moot.The text was updated successfully, but these errors were encountered: