Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Function Call Object Injection Sink #286

Open
ps-vm opened this issue Jun 8, 2022 · 0 comments
Open

Function Call Object Injection Sink #286

ps-vm opened this issue Jun 8, 2022 · 0 comments

Comments

@ps-vm
Copy link

ps-vm commented Jun 8, 2022

Please help prevent duplicate issues before submitting a new one:

  • [ x] I've searched other open/closed issues for duplicates before opening up this new issue.

Report

Our SAST report picked up a critical vulnerability within this library

  • "Bracket object notation with user input is present, this might allow an attacker to access all properties of the object and even it's prototype, leading to possible code execution."

What did you do?

Configured SAST to run within GitLab pipelines for our iOS project.

What did you expect to happen?

No critical vulnerabilities

What happened instead?

One critical vulnerability related to this library has been flagged in the highlight.js file.
We're on the latest version of this library and need to be able to reduce all critical and high vulnerabilities in order to ensure we're releasing secure products.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant