Improper Control of Dynamically-Managed Code Resources in GitHub repository budibase/budibase prior to 1.3.20.
The product does not properly restrict reading from or writing to dynamically-managed code resources such as variables, objects, classes, attributes, functions, or executable instructions or statements.
Link | Tags |
---|---|
https://huntr.dev/bounties/a13a56b7-04da-4560-b8ec-0d637d12a245 | issue tracking patch exploit third party advisory |
https://github.com/budibase/budibase/commit/d35864be0854216693a01307f81ffcabf6d549df | third party advisory patch |