Closed dejanzelic closed 2 years ago
Was this ever resolved?
It was. The issue is that the deep-extend package was using a version vulnerable to prototype pollution. In October of 2021 (version 0.7.0) it was bumped to the latest. Prototype pollution is not always exploitable, but in this situation it was if client options can be provided by the user. This means that the old version which used deep-extend 0.4.2 was vulnerable to remote code execution (again, in certain circumstances).
What would be the best way for me to submit a security issue? I'd prefer to send it privately instead of a GitHub issue if possible.