binary-parser is vulnerable to Code Injection
90
Critical Risk
Affected versions of this package suffered from a code-injection vulnerability: attacker-controlled values provided as field names or encoding names could lead to arbitrary code execution within the parser. The patch introduces sanitization logic: it validates field names and encoding names against a safe pattern and rejects invalid ones — preventing injection via malformed names or encoding values.
You are affected if you are using a version that falls within the vulnerable range.
binary-parser is vulnerable to Code Injection in versions 1.3.3 - 2.2.1.
Upgrade the binary-parser library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant