qs@6.0.4 vulnerabilities

A querystring parser that supports nesting and arrays, with a depth limit

  • latest version

    6.14.0

  • latest non vulnerable version

  • first published

    14 years ago

  • latest version published

    10 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the qs package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Prototype Poisoning

    qs is a querystring parser that supports nesting and arrays, with a depth limit.

    Affected versions of this package are vulnerable to Prototype Poisoning which allows attackers to cause a Node process to hang, processing an Array object whose prototype has been replaced by one with an excessive length value.

    Note: In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000.

    How to fix Prototype Poisoning?

    Upgrade qs to version 6.2.4, 6.3.3, 6.4.1, 6.5.3, 6.6.1, 6.7.3, 6.8.3, 6.9.7, 6.10.3 or higher.

    <6.2.4>=6.3.0 <6.3.3>=6.4.0 <6.4.1>=6.5.0 <6.5.3>=6.6.0 <6.6.1>=6.7.0 <6.7.3>=6.8.0 <6.8.3>=6.9.0 <6.9.7>=6.10.0 <6.10.3