Added latest gonzales-pe 4.3.0, as gonzales-pe 4.2.4 uses old "dependencies": {
"minimist": "1.1.x"
},
which reported Vulnerability
Affected versions of minimist are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of Object, causing the addition or modification of an existing property that will exist on all objects.
Parsing the argument --proto.y=Polluted adds a y property with value Polluted to all objects. The argument --proto=Polluted raises and uncaught error and crashes the application.
This is exploitable if attackers have control over the arguments being passed to minimist.
Added latest gonzales-pe 4.3.0, as gonzales-pe 4.2.4 uses old "dependencies": { "minimist": "1.1.x" },
which reported Vulnerability
Affected versions of minimist are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of Object, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument --proto.y=Polluted adds a y property with value Polluted to all objects. The argument --proto=Polluted raises and uncaught error and crashes the application. This is exploitable if attackers have control over the arguments being passed to minimist.