superjson@1.5.1 vulnerabilities

- 🍱 Reliable serialization and deserialization - 🔐 Type safety with autocompletion - 🐾 Negligible runtime footprint - 💫 Framework agnostic - 🛠 Perfect fix for Next.js's serialisation limitations in `getServerSideProps` and `getInitialProps`

  • latest version

    2.2.3

  • latest non vulnerable version

  • first published

    10 years ago

  • latest version published

    1 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the superjson package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Remote Code Execution (RCE)

    superjson is a Safely serialize JavaScript expressions to a superset of JSON, which includes Dates, BigInts, and more.

    Affected versions of this package are vulnerable to Remote Code Execution (RCE) as it allows to run arbitrary code on any server using superjson input, including a Blitz.js server, without prior authentication or knowledge. Attackers gain full control over the server so they could steal and manipulate data or attack further systems.

    How to fix Remote Code Execution (RCE)?

    Upgrade superjson to version 1.8.1 or higher.

    <1.8.1