@astrojs/node@9.4.4 vulnerabilities

Deploy your site to a Node.js server

  • latest version

    9.5.0

  • latest non vulnerable version

  • first published

    3 years ago

  • latest version published

    20 hours ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the @astrojs/node package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

    @astrojs/node is a Deploy your site to a Node.js server

    Affected versions of this package are vulnerable to Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') via the X-Forwarded-Host header when using the Astro.url property without validation. An attacker can manipulate output content and potentially cause users to be redirected to malicious sites, allowing login credentials theft by sending crafted headers.

    Note:

    1. This is only exploitable if the application is deployed in on-demand/dynamic rendering mode.

    2. In case of using a caching proxy, any page which is cached could persist the malicious value for subsequent users.

    How to fix Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')?

    Upgrade @astrojs/node to version 9.4.5 or higher.

    <9.4.5