forked from typpo/quickchart
-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Description
Description
A code injection vulnerability has been detected where unsanitized user input is evaluated as code, allowing for arbitrary code execution.
Location
- File: lib/charts.js
- Line: 141
Issue
User-provided input is being executed as code without proper sanitization, which could allow an attacker to inject and execute arbitrary code. This is a critical security vulnerability that could lead to remote code execution.
Recommendation
To fix this issue:
- Avoid evaluating user input as code whenever possible
- If evaluation is necessary, implement strict validation and sanitization of the input
- Use a sandbox or restricted execution environment
- Consider JSON.parse() or other safer alternatives for parsing user input
Severity
Critical - This vulnerability allows for arbitrary code execution, which is one of the most severe security risks.
References
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels