GMS-2018-4: Arbitrary Code Injection
mobile-icon-resizer has a code execution vulnerability via the image resizing configuration: the parameters ratio
and baseRatio
are passed directly to eval()
, thus allowing dynamic javascript payloads to be executed.
References
Detect and mitigate GMS-2018-4 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →