GMS-2020-43: Command Injection in addax
(updated )
Versions of addax
are vulnerable to Command Injection. The package does not validate user input on the presignPath
function which receives input directly from the API endpoint. Exploiting the vulnerability requires authentication. This may allow attackers to run arbitrary commands in the system. Upgrade to or later.
References
Detect and mitigate GMS-2020-43 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →