Description
A vulnerability was found in querystringify before 2.0.0. It’s possible to override built-in properties of the resulting query string object if a malicious string is inserted in the query string.
Recommendation
Update the querystringify
package to the latest compatible version. Followings are version details:
- Affected version(s): < 2.0.0
- Patched version(s): 2.0.0
References
Related Issues
- Path Traversal in general-file-server - CVE-2018-3724
- qs vulnerable to Prototype Pollution - CVE-2022-24999
- Server-Side Request Forgery in axios - CVE-2024-39338
- DOS by abusing `fetchOptions.retry`. - CVE-2023-49800
- Tags:
- npm
- querystringify
Anything's wrong? Let us know Last updated on November 29, 2023