From df30e8a3304bb2887c17f2b63a5c57131b527966 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 2 Aug 2023 23:09:59 +0000 Subject: [PATCH] Publish GHSA-p8p7-x288-28g6 --- .../2023/03/GHSA-p8p7-x288-28g6/GHSA-p8p7-x288-28g6.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2023/03/GHSA-p8p7-x288-28g6/GHSA-p8p7-x288-28g6.json b/advisories/github-reviewed/2023/03/GHSA-p8p7-x288-28g6/GHSA-p8p7-x288-28g6.json index 677013e6b3958..d612b964ae730 100644 --- a/advisories/github-reviewed/2023/03/GHSA-p8p7-x288-28g6/GHSA-p8p7-x288-28g6.json +++ b/advisories/github-reviewed/2023/03/GHSA-p8p7-x288-28g6/GHSA-p8p7-x288-28g6.json @@ -1,13 +1,13 @@ { "schema_version": "1.4.0", "id": "GHSA-p8p7-x288-28g6", - "modified": "2023-07-31T15:17:07Z", + "modified": "2023-08-02T23:08:46Z", "published": "2023-03-16T15:30:19Z", "aliases": [ "CVE-2023-28155" ], "summary": "Server-Side Request Forgery in Request", - "details": "The `request` package through 2.88.2 for Node.js and the `@cypress/request` package through 2.88.11 allow a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP).\n\nNOTE: The `request` package is no longer supported by the maintainer.", + "details": "The `request` package through 2.88.2 for Node.js and the `@cypress/request` package through 2.88.12 allow a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP).\n\nNOTE: The `request` package is no longer supported by the maintainer.", "severity": [ { "type": "CVSS_V3",