subtext@5.0.1 vulnerabilities
HTTP payload parsing
-
latest version
6.0.12
-
first published
10 years ago
-
latest version published
6 years ago
-
licenses detected
- >=1.1.0
Direct Vulnerabilities
Known vulnerabilities in the subtext package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
subtext is a HTTP payload parsing library. Deprecated. Note: This package is deprecated and is now maintained as @hapi/subtext Affected versions of this package are vulnerable to Prototype Pollution. A multipart payload can be constructed in a way that one of the parts’ content can be set as the entire payload object’s prototype. If this prototype contains data, it may bypass other validation rules which enforce access and privacy. If this prototype evaluates to null, it can cause unhandled exceptions when the request payload is accessed. How to fix Prototype Pollution? There is no fixed version for |
*
|
subtext is a HTTP payload parsing library. Deprecated. Note: This package is deprecated and is now maintained as @hapi/subtext Affected versions of this package are vulnerable to Denial of Service (DoS). The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services. How to fix Denial of Service (DoS)? There is no fixed version for |
>=4.1.0
|
subtext is a HTTP payload parsing library. Deprecated. Note: This package is deprecated and is now maintained as @hapi/subtext Affected versions of this package are vulnerable to Denial of Service (DoS).
The package fails to enforce the How to fix Denial of Service (DoS)? There is no fixed version for |
*
|