Description
TurboBoost Commands has existing protections in place to guarantee that only public methods on Command classes can be invoked; however, the existing checks aren’t as robust as they should be.
Recommendation
Update the @turbo-boost/commands package to the latest compatible version. Followings are version details:
Affected version(s): **>= 0.2.0, < 0.2.2 < 0.1.3** Patched version(s): **0.2.2 0.1.3**
References
Related Issues
- PDF.js vulnerable to arbitrary JavaScript execution upon opening a malicious PDF - CVE-2024-4367
- xmlhttprequest and xmlhttprequest-ssl vulnerable to Arbitrary Code Injection (GHSA-h4j5-c7cj-74xg) - CVE-2020-28502
- xmlhttprequest and xmlhttprequest-ssl vulnerable to Arbitrary Code Injection - CVE-2020-28502
- Joplin is vulnerable to arbitrary code execution - CVE-2022-35131
- Tags:
- npm
- @turbo-boost/commands
Anything's wrong? Let us know Last updated on March 18, 2024