You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on May 20, 2025. It is now read-only.
Thanks so much for filing an issue or feature request! Please fill out the following (wherever relevant):
Steps to Reproduce
Submit app to google play store with version ^6.2.0 (from my package.json)
Expected Behavior
What you expected to happen?
App is not rejected for security vulnerability
Actual Behavior
What actually happens?
Your app contains an unsafe unzipping pattern that may lead to a Path Traversal vulnerability. Please see [this Google Help Center article](https://support.google.com/faqs/answer/9294009) to learn how to fix the issue.
- com.microsoft.codepush.react.FileUtils.unzipFile
Reproducible Demo
Go into the source directory for react-native-code-push@6.2.0 and run
Thanks so much for filing an issue or feature request! Please fill out the following (wherever relevant):
Steps to Reproduce
Expected Behavior
What you expected to happen?
App is not rejected for security vulnerability
Actual Behavior
What actually happens?
Reproducible Demo
Go into the source directory for react-native-code-push@6.2.0 and run
It outputs
Environment
^6.2.0^0.63.4Specific to Android, not specific to version of Android OSnot applicable, but releasenot applicable, but both presumably(The more info the faster we will be able to address it!)