Arbitrary Code Execution in json-ptr
High severity
GitHub Reviewed
Published
May 26, 2021
to the GitHub Advisory Database
•
Updated Jan 9, 2023
Description
Reviewed
May 26, 2021
Published to the GitHub Advisory Database
May 26, 2021
Last updated
Jan 9, 2023
There is a security vulnerability in
json-ptr
versions prior to v2.1.0 in which an unscrupulous actor may execute arbitrary code. If your code sends un-sanitized user input to json-ptr's .get() method, your project is vulnerable to this injection-style vulnerability.References