2020-07-29 12:40:18
snyk
PUBLISHED
This affects all versions of package mock2easy. a malicious user could inject commands through the _data variable: Affected Area require(../server/getJsonByCurl)(mock2easy, function (error, stdout) { if (error) { return res.json(500, error); } res.json(JSON.parse(stdout)); }, , _data.interfaceUrl, query, _data.cookie,_data.interfaceType);