-
Notifications
You must be signed in to change notification settings - Fork 0
Description
WS-2018-0588 - High Severity Vulnerability
Vulnerable Library - querystringify-0.0.4.tgz
Querystringify - Small, simple but powerful query string parser.
Library home page: https://registry.npmjs.org/querystringify/-/querystringify-0.0.4.tgz
Path to dependency file: /sample-node/package.json
Path to vulnerable library: /tmp/git/sample-node/node_modules/querystringify/package.json
Dependency Hierarchy:
- build-angular-0.5.13.tgz (Root Library)
- webpack-dev-server-3.1.4.tgz
- sockjs-client-1.1.4.tgz
- eventsource-0.1.6.tgz
- original-1.0.0.tgz
- url-parse-1.0.5.tgz
- ❌ querystringify-0.0.4.tgz (Vulnerable Library)
- url-parse-1.0.5.tgz
- original-1.0.0.tgz
- eventsource-0.1.6.tgz
- sockjs-client-1.1.4.tgz
- webpack-dev-server-3.1.4.tgz
Found in HEAD commit: 1ea999e8fa06fbdc6bea365012c22cfee1747788
Vulnerability Details
A vulnerability was found in querystringify before 2.0.0. It's possible to override built-in properties of the resulting query string object if a malicious string is inserted in the query string.
Publish Date: 2019-06-04
URL: WS-2018-0588
Suggested Fix
Type: Upgrade version
Origin: unshiftio/querystringify@422eb4f
Release Date: 2019-06-04
Fix Resolution: 2.0.0
Step up your Open Source Security Game with WhiteSource here