-
Notifications
You must be signed in to change notification settings - Fork 44
Open
Description
I am using curlrequest in one of my tools and GitHub marks it as security issue:
high severity
Vulnerable versions: <= 1.0.1
Patched version: No fix
curlrequest through 1.0.1 allows execution of arbitrary commands. It is possible to inject arbitrary commands by using a semicolon char in any of the options values.
Code: CVE-2020-7646
Any way to fix this?
HaydenMacDonald and readme42
Metadata
Metadata
Assignees
Labels
No labels