@commercial/subtext@5.1.0 vulnerabilities

HTTP payload parsing

Direct Vulnerabilities

Known vulnerabilities in the @commercial/subtext package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Prototype Pollution

@commercial/subtext is a HTTP payload parsing library.

Affected versions of this package are vulnerable to Prototype Pollution. A multipart payload can be constructed in a way that one of the parts’ content can be set as the entire payload object’s prototype. If this prototype contains data, it may bypass other validation rules which enforce access and privacy. If this prototype evaluates to null, it can cause unhandled exceptions when the request payload is accessed.

How to fix Prototype Pollution?

Upgrade @commercial/subtext to version 5.1.2 or higher.

<5.1.2
  • H
Denial of Service (DoS)

@commercial/subtext is an HTTP payload parsing library.

Affected versions of this package are vulnerable to Denial of Service (DoS). The package fails to enforce the maxBytes configuration for payloads with chunked encoding that are written to the file system. This allows attackers to send requests with arbitrary payload sizes, which may exhaust system resources.

How to fix Denial of Service (DoS)?

Upgrade @commercial/subtext to version 5.1.1 or higher.

<5.1.1