You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We use signalR package in our application which internally references eventsource version 1.0.7.
We have the below security vulnerability reported for this version asking us to upgrade to 2.0.2
When fetching an url with a link to an external site (Redirect), the users Cookies & Autorisation headers are leaked to the third party application. According to the same-origin-policy, the header should be "sanitized."
We noticed that even the latest signalR version 6.0.5 still doesnt upgrade the eventsource package version.
Could you please advise how we can go about this?
The text was updated successfully, but these errors were encountered:
We use signalR package in our application which internally references eventsource version 1.0.7.
We have the below security vulnerability reported for this version asking us to upgrade to 2.0.2
When fetching an url with a link to an external site (Redirect), the users Cookies & Autorisation headers are leaked to the third party application. According to the same-origin-policy, the header should be "sanitized."
We noticed that even the latest signalR version 6.0.5 still doesnt upgrade the eventsource package version.
Could you please advise how we can go about this?
The text was updated successfully, but these errors were encountered: