Headline
GHSA-qv32-5wm2-p32h: Command Injection in sequenceserver
Impact
Several HTTP endpoints did not properly sanitize user input and/or query parameters. This could be exploited to inject and run unwanted shell commands
Patches
Fixed in 3.1.2
Workarounds
No known workarounds
Command Injection in sequenceserver
Critical severity GitHub Reviewed Published Aug 13, 2024 in wurmlab/sequenceserver • Updated Aug 13, 2024