GMS-2020-341: Unintended Require in larvitbase-www
All versions of larvitbase-www
are vulnerable to an Unintended Require. The package exposes an API endpoint and passes a GET parameter unsanitized to an require()
call. This allows attackers to execute any .js
file in the same folder as the server is running. No fix is currently available. Consider using an alternative package until a fix is made available.
References
Detect and mitigate GMS-2020-341 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →