Conversation
Signed-off-by: Glenn Lewis <6598971+gmlewis@users.noreply.github.com>
Signed-off-by: Glenn Lewis <6598971+gmlewis@users.noreply.github.com>
Codecov Report
@@ Coverage Diff @@
## master #2805 +/- ##
=======================================
Coverage 98.06% 98.06%
=======================================
Files 132 132
Lines 11650 11655 +5
=======================================
+ Hits 11424 11429 +5
Misses 154 154
Partials 72 72
|
|
It's a bit fishy, not sure if it can be bypassed by encoding the dots. Using https://pkg.go.dev/net/url#URL.ResolveReference and seeing if the result is different than the input would be a more bulletproof way to do it. Also, it could be applied to the whole |
|
@molnarg - PRs are welcome. Thank you. |
|
Could we get more information on the actual vulnerability this is protecting from, and the timeline to its resolution, if any ? Right now, I am considering multiple options:
As I cannot find any reference to the vulnerability in the GitHub API documentation, I have difficulty making an informed decision 🙂 . |
|
@mrbobbytables - are you able to share any more information on the vulnerability that was reported to you? |
|
@mrbobbytables : Would you happen to know (1) whether this vulnerability still exists and (2) whether the vulnerability affects any paths that literally contain |
No description provided.