edgee-server is vulnerable to Improper Input Validation
32
Low Risk
Affected versions of the package do not properly validate payloads. Specifically, requests with an empty fetch destination are not blocked, which could be exploited for malicious purposes or result in unnecessary processing. The patch addresses this by adding 'empty' to the list of forbidden fetch destinations in the do_process_payload function, ensuring such requests are rejected.
You are affected if you are using a version that falls within the vulnerable range.
edgee-server is vulnerable to Improper Input Validation in versions 0.4.3 - 1.2.1.
Upgrade the edgee-server library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant