-
-
Notifications
You must be signed in to change notification settings - Fork 796
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
jsonpath-plus < 10.0.0 is vulnerable to Remote Code Execution #1825
Comments
Is this also going to be fixed in any of the older versions, i.e. < v14? For those people that haven't upgraded to serverless v4 yet? The faqs do state the following:
|
I've just faced this issue. It'd be great to have a fix on this issue. I'm currently on v13.8.1. |
Hi! @Alxblsk you might be able to fix this by overriding the
Note: This approach will ensure the top-level package is overwritten, hence fixing your vulnerability alert (just because you might wonder that the lockfile still listing |
I will wait for tests and release new versions |
Feature Request
According to https://nvd.nist.gov/vuln/detail/CVE-2024-21534, there's a vulnerability in
jsonpath-plus
package used inserverless-offline
due to improper sanitization. According to Snyk, severity is "critical".Would be great if package can be bumped to v10 so fix the issue.
Expected behavior/code
serverless-offline
has the issue fixed to let consumers to upgrade.The text was updated successfully, but these errors were encountered: