Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(security): prevent potential prototype pollution via request body filter #1388

Merged
merged 3 commits into from
Feb 20, 2023

Conversation

iainsproat
Copy link
Contributor

Description & motivation

Addresses https://github.com/specklesystems/admin/issues/375

Changes:

The spread operator creates a shallow clone of only own properties. https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Operators/Spread_syntax#spread_in_object_literals

To-do before merge:

Screenshots:

Validation of changes:

Checklist:

  • My pull request follows the guidelines in the Contributing guide?
  • My pull request does not duplicate any other open Pull Requests for the same update/change?
  • My commits are related to the pull request and do not amend unrelated code or documentation.
  • My code follows a similar style to existing code.
  • I have added appropriate tests.
  • I have updated or added relevant documentation.

References

@iainsproat iainsproat changed the title fix(security): prevent potential pollution of request body being executed fix(security): prevent potential prototype pollution via request body filter Feb 20, 2023
@iainsproat iainsproat marked this pull request as ready for review February 20, 2023 14:53
@iainsproat iainsproat merged commit 787e856 into main Feb 20, 2023
@iainsproat iainsproat deleted the iain/expand-body-before-using-functions branch February 20, 2023 15:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant