Open sonatype-depshield[bot] opened 1 year ago
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
A regular expression that requires exponential time to match certain inputs can be a performance bottleneck, and may be vulnerable to denial-of-service attacks.
Server-Side Request Forgery (SSRF) vulnerabilities are caused when an attacker can supply or modify a URL that reads or sends data to the server. The attacker can create a malicious request with a manipulated URL, when this request reaches the server, the server-side code executes the exploit URL causing the attacker to be able to read data from services that shouldn't be exposed.
Depshield will be deprecated soon
Please install our new product, Sonatype Lift with advanced features
Vulnerabilities
DepShield reports that this application's usage of axios:0.19.0 results in the following vulnerability(s):
Occurrences
axios:0.19.0 is a transitive dependency introduced by the following direct dependency(s):
• browser-sync:2.26.13 └─ localtunnel:2.0.0 └─ axios:0.19.0
This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.