GHSA-p483-wpfp-42cj: code-server's session cookie can be extracted by having user visit specially crafted proxy URL
A maliciously crafted URL using the proxy
subpath can result in the attacker gaining access to the session token.
References
Code Behaviors & Features
Detect and mitigate GHSA-p483-wpfp-42cj with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →