
We found results for “”
WS-2018-0588
Good to know:


Date: April 19, 2018
A vulnerability was found in querystringify before 2.0.0. It's possible to override built-in properties of the resulting query string object if a malicious string is inserted in the query string.
Language: Java
Severity Score
Related Resources (4)
Severity Score
Weakness Type (CWE)
Stack-based Buffer Overflow
CWE-121Top Fix

Upgrade Version
Upgrade to version oburatongoi/productivity - no_fix;oburatongoi/productivity - 0.0.1;Fable.Template.Elmish.React - 0.1.6;chrisbraybrooke/laravel-ecommerce - 0.0.2;chrisbraybrooke/laravel-ecommerce - 0.0.17;chrisbraybrooke/laravel-ecommerce - 0.0.56;chrisbraybrooke/laravel-ecommerce - dev-form-field-key;zombie.js - no_fix;genenotebook - 0.3.0;querystringify - 2.0.0;MIDIator.WebClient - 1.0.105;org.webjars.npm:querystringify:2.0.0
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | HIGH |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | NONE |