Johannschopplich Nuxt Api Party vulnerabilities
2 known vulnerabilities affecting johannschopplich/nuxt_api_party.
Total CVEs
2
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH2
Vulnerabilities
Page 1 of 1
CVE-2023-49799HIGHCVSS 7.5≤ 0.21.32023-12-09
CVE-2023-49799 [HIGH] CWE-918 CVE-2023-49799: `nuxt-api-party` is an open source module to proxy API requests. nuxt-api-party attempts to check if
`nuxt-api-party` is an open source module to proxy API requests. nuxt-api-party attempts to check if the user has passed an absolute URL to prevent the aforementioned attack. This has been recently changed to use the regular expression `^https?://`, however this regular expression can be bypassed by an absolute URL with leading whitespace. For example
nvd
CVE-2023-49800HIGHCVSS 7.5≤ 0.21.32023-12-09
CVE-2023-49800 [HIGH] CWE-400 CVE-2023-49800: `nuxt-api-party` is an open source module to proxy API requests. The library allows the user to send
`nuxt-api-party` is an open source module to proxy API requests. The library allows the user to send many options directly to `ofetch`. There is no filter on which options are available. We can abuse the retry logic to cause the server to crash from a stack overflow. fetchOptions are obtained directly from the request body. A malicious user can constr
nvd