@hapi/subtext/.../subtext@7.0.1 vulnerabilities

HTTP payload parsing

  • latest version

    8.1.0

  • latest non vulnerable version

  • first published

    5 years ago

  • latest version published

    1 years ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the @hapi/subtext package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Prototype Pollution

    @hapi/subtext is a HTTP payload parsing library.

    Affected versions of this package are vulnerable to Prototype Pollution. A multipart payload can be constructed in a way that one of the parts’ content can be set as the entire payload object’s prototype. If this prototype contains data, it may bypass other validation rules which enforce access and privacy. If this prototype evaluates to null, it can cause unhandled exceptions when the request payload is accessed.

    How to fix Prototype Pollution?

    Upgrade @hapi/subtext to version 6.1.3, 7.0.3 or higher.

    <6.1.3>=7.0.0 <7.0.3
    • H
    Denial of Service (DoS)

    @hapi/subtext is a HTTP payload parsing library.

    Affected versions of this package are vulnerable to Denial of Service (DoS). The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.

    How to fix Denial of Service (DoS)?

    Upgrade @hapi/subtext to version 6.1.3, 7.0.3 or higher.

    >=4.1.0 <6.1.3>=7.0.0 <7.0.3