Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sort out NPM dependencies #2033

Closed
simonswine opened this issue Jul 10, 2023 · 1 comment
Closed

Sort out NPM dependencies #2033

simonswine opened this issue Jul 10, 2023 · 1 comment
Assignees

Comments

@simonswine
Copy link
Contributor

Looking at the dependabot alerts it looks quite bad, quite a few critical, high alerts, I suggest we need to update rather sooner than later. Most of it is coming via pyroscope-oss, as far as I can tell. I failed to update it appropriate.

> trivy filesystem ./yarn.lock
yarn.lock (yarn)

Total: 16 (UNKNOWN: 0, LOW: 1, MEDIUM: 10, HIGH: 4, CRITICAL: 1)

┌──────────────┬─────────────────────┬──────────┬───────────────────┬───────────────┬──────────────────────────────────────────────────────────────┐
│   Library    │    Vulnerability    │ Severity │ Installed Version │ Fixed Version │                            Title                             │
├──────────────┼─────────────────────┼──────────┼───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ d3-color     │ GHSA-36jr-mh4h-2g58 │ HIGH     │ 1.4.1             │ 3.1.0         │ d3-color vulnerable to ReDoS                                 │
│              │                     │          │                   │               │ https://github.com/advisories/GHSA-36jr-mh4h-2g58            │
├──────────────┼─────────────────────┤          ├───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ nth-check    │ CVE-2021-3803       │          │ 1.0.2             │ 2.0.1         │ inefficient regular expression complexity                    │
│              │                     │          │                   │               │ https://avd.aquasec.com/nvd/cve-2021-3803                    │
├──────────────┼─────────────────────┤          ├───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ parse-path   │ CVE-2022-0624       │          │ 4.0.4             │ 5.0.0         │ Authorization Bypass in parse-path                           │
│              │                     │          │                   │               │ https://avd.aquasec.com/nvd/cve-2022-0624                    │
├──────────────┼─────────────────────┼──────────┼───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ parse-url    │ CVE-2022-2900       │ CRITICAL │ 6.0.5             │ 8.1.0         │ Server-Side Request Forgery (SSRF) in GitHub repository      │
│              │                     │          │                   │               │ ionicabizau/parse-url                                        │
│              │                     │          │                   │               │ https://avd.aquasec.com/nvd/cve-2022-2900                    │
│              ├─────────────────────┼──────────┤                   │               ├──────────────────────────────────────────────────────────────┤
│              │ CVE-2022-3224       │ MEDIUM   │                   │               │ parse-url parses http URLs incorrectly, making it vulnerable │
│              │                     │          │                   │               │ to host name spoofing...                                     │
│              │                     │          │                   │               │ https://avd.aquasec.com/nvd/cve-2022-3224                    │
├──────────────┼─────────────────────┼──────────┼───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ protobufjs   │ CVE-2023-36665      │ HIGH     │ 6.11.3            │ 7.2.4         │ protobufjs Prototype Pollution vulnerability                 │
│              │                     │          │                   │               │ https://avd.aquasec.com/nvd/cve-2023-36665                   │
├──────────────┼─────────────────────┼──────────┼───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ request      │ CVE-2023-28155      │ MEDIUM   │ 2.88.2            │               │ The Request package through 2.88.1 for Node.js allows a      │
│              │                     │          │                   │               │ bypass of SSRF...                                            │
│              │                     │          │                   │               │ https://avd.aquasec.com/nvd/cve-2023-28155                   │
├──────────────┼─────────────────────┤          ├───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ semver       │ CVE-2022-25883      │          │ 5.7.1             │ 7.5.2         │ semver vulnerable to Regular Expression Denial of Service    │
│              │                     │          │                   │               │ https://avd.aquasec.com/nvd/cve-2022-25883                   │
│              │                     │          ├───────────────────┤               │                                                              │
│              │                     │          │ 6.3.0             │               │                                                              │
│              │                     │          │                   │               │                                                              │
│              │                     │          ├───────────────────┤               │                                                              │
│              │                     │          │ 7.3.8             │               │                                                              │
│              │                     │          │                   │               │                                                              │
│              │                     │          ├───────────────────┤               │                                                              │
│              │                     │          │ 7.5.0             │               │                                                              │
│              │                     │          │                   │               │                                                              │
│              │                     │          ├───────────────────┤               │                                                              │
│              │                     │          │ 7.5.1             │               │                                                              │
│              │                     │          │                   │               │                                                              │
├──────────────┼─────────────────────┼──────────┼───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ sweetalert2  │ GHSA-qq6h-5g6j-q3cm │ LOW      │ 11.7.3            │               │ sweetalert2 v11.4.9 and above contains hidden functionality  │
│              │                     │          │                   │               │ https://github.com/advisories/GHSA-qq6h-5g6j-q3cm            │
├──────────────┼─────────────────────┼──────────┼───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ tough-cookie │ CVE-2023-26136      │ MEDIUM   │ 2.5.0             │ 4.1.3         │ prototype pollution in cookie memstore                       │
│              │                     │          │                   │               │ https://avd.aquasec.com/nvd/cve-2023-26136                   │
│              │                     │          ├───────────────────┤               │                                                              │
│              │                     │          │ 4.1.2             │               │                                                              │
│              │                     │          │                   │               │                                                              │
├──────────────┼─────────────────────┤          ├───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ word-wrap    │ CVE-2023-26115      │          │ 1.2.3             │               │ ReDoS                                                        │
│              │                     │          │                   │               │ https://avd.aquasec.com/nvd/cve-2023-26115                   │
└──────────────┴─────────────────────┴──────────┴───────────────────┴───────────────┴──────────────────────────────────────────────────────────────┘

@darrenjaneczek darrenjaneczek self-assigned this Jul 14, 2023
@simonswine simonswine transferred this issue from grafana/phlare Jul 19, 2023
@simonswine
Copy link
Contributor Author

We track this in #2000 now

@simonswine simonswine closed this as not planned Won't fix, can't repro, duplicate, stale Jul 21, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants