Skip to content

Conversation

@usu
Copy link
Member

@usu usu commented Apr 12, 2025

No description provided.

@usu usu requested review from BacLuc and manuelmeister April 12, 2025 19:45
@usu usu merged commit 94ba90b into ecamp:v3 Apr 12, 2025
5 of 6 checks passed
}

const pathname = parsedBaseUrl.pathname.replace(/\/$/, '')
return sorted.replace(new RegExp(`^${pathname}`), '')
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This could be considered a regexp vulnerability, because depending on the application, user controllable input may used as a regexp. A check with startsWith plus a substr should be a little safer here

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants