Vulnerabilities |
1 via 3 paths |
|---|---|
Dependencies |
57 |
Source |
GitHub |
Find, fix and prevent vulnerabilities in your code.
high severity
- Vulnerable module: json
- Introduced through: faraday@2.14.1 and jekyll-github-metadata@2.14.0
Detailed paths
-
Introduced through: MichaelCurrin/my-github-projects:Gemfile.lock@MichaelCurrin/my-github-projects › faraday@2.14.1 › json@2.18.1Remediation: Upgrade to faraday@2.14.1.
-
Introduced through: MichaelCurrin/my-github-projects:Gemfile.lock@MichaelCurrin/my-github-projects › jekyll-github-metadata@2.14.0 › octokit@4.25.1 › faraday@2.14.1 › json@2.18.1Remediation: Upgrade to jekyll-github-metadata@2.14.0.
-
Introduced through: MichaelCurrin/my-github-projects:Gemfile.lock@MichaelCurrin/my-github-projects › jekyll-github-metadata@2.14.0 › octokit@4.25.1 › sawyer@0.9.3 › faraday@2.14.1 › json@2.18.1Remediation: Upgrade to jekyll-github-metadata@2.14.0.
Overview
json is a JSON implementation as a Ruby extension in C.
Affected versions of this package are vulnerable to Use of Externally-Controlled Format String in JSON.parse(doc, allow_duplicate_key: false). An attacker can cause denial of service or disclose sensitive information via malicious format strings. This is only exploitable if the allow_duplicate_key: false option is explicitly enabled.
Remediation
Upgrade json to version 2.15.2.1, 2.17.1.2, 2.19.2 or higher.