Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vulnerability: Remote Code Execution (RCE) in jsonpath-plus versions < 10.3.0 #1964

Open
Jeffaaah opened this issue Mar 10, 2025 · 3 comments
Labels
dependencies Pull requests that update a dependency file javascript Pull requests that update Javascript code

Comments

@Jeffaaah
Copy link

Hi there,

Gemnasium found the following:

Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute arbitrary code on the system by exploiting the unsafe default usage of eval='safe' mode.

I have upgraded to the latest version of Orval to ensure compatibility and security (^7.6.0)
If more information needed please let me know.

Kind regards,
Jeffrey.

@melloware
Copy link
Collaborator

@Jeffaaah can you tell where jsonpath-plus is coming from?

@melloware melloware added javascript Pull requests that update Javascript code dependencies Pull requests that update a dependency file labels Mar 10, 2025
@Jeffaaah
Copy link
Author

Its in the tree under: @stoplight/spectral-core 1.19.4

If you want the full tree please let me know.

@melloware
Copy link
Collaborator

OK looks like we are waiting on a release from IBM: IBM/openapi-validator#731 We get that through IBM OpenAPI Ruleset.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file javascript Pull requests that update Javascript code
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants