I am using curlrequest in one of my tools and GitHub marks it as security issue:
high severity
Vulnerable versions: <= 1.0.1
Patched version: No fix
curlrequest through 1.0.1 allows execution of arbitrary commands. It is possible to inject arbitrary commands by using a semicolon char in any of the options values.
I am using curlrequest in one of my tools and GitHub marks it as security issue:
high severity Vulnerable versions: <= 1.0.1 Patched version: No fix curlrequest through 1.0.1 allows execution of arbitrary commands. It is possible to inject arbitrary commands by using a semicolon char in any of the options values.
Code: CVE-2020-7646
Any way to fix this?