As of today, we are not aware of any Prisma users or external consumers of the @prisma/sdk package who are affected by this security vulnerability.
This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
It only affects the getPackedPackage function and this function is not advertised and only used for tests & building our CLI, no malicious code was found after checking our codebase.
Fixed in - @prisma/sdk@2.20.0 (latest channel) - @prisma/sdk@2.20.0-dev.29 (dev channel)
Pull Request closing this vulnerability https://github.com/prisma/prisma/pull/6245
This issue was discovered and reported by GitHub Engineer @erik-krogh (Erik Krogh Kristensen).
If you have any questions or comments about this advisory:
{
"nvd_published_at": "2021-04-29T01:15:00Z",
"cwe_ids": [
"CWE-78"
],
"github_reviewed_at": "2021-03-31T18:00:32Z",
"severity": "HIGH",
"github_reviewed": true
}