This affects the package teddy before 0.5.9. A type confusion vulnerability can be used to bypass input sanitization when the model content is an array (instead of a string).
The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
Link | Tags |
---|---|
https://snyk.io/vuln/SNYK-JS-TEDDY-1579557 | third party advisory exploit |
https://github.com/rooseveltframework/teddy/pull/518 | third party advisory patch |
https://github.com/rooseveltframework/teddy/releases/tag/0.5.9 | third party advisory release notes |