jsonrepair is vulnerable to Improper Input Validation
43
Medium Risk
Affected versions of this package are vulnerable to a Regular Expression Injection via a crafted payload beginning with a forward slash (/), where the mechanism that wraps regex-like strings in double quotes fails to escape existing internal quotes. An attacker can exploit this by supplying an input like /foo"; console.log(-1); "/, where the unescaped quote (") after foo breaks out of the generated string literal, allowing arbitrary JavaScript code execution within contexts like eval or inline <script> tags, as the repaired output becomes is valid, executable code.
You are affected if you are using a version that falls within the vulnerable range.
jsonrepair is vulnerable to Improper Input Validation in versions 3.9.0 - 3.13.1.
Upgrade the jsonrepair library to a patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant