-
Notifications
You must be signed in to change notification settings - Fork 36
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ReDoS in path-parse #8
Comments
Is there any update on patching this vulnerability? This is a core NPM package that is heavily used by many other packages and I foresee a lot of failing pipelines now that this has a CVE logged. |
I have emailed @jbgutierrez to see if he would be willing to patch this, but have not yet received a response. |
I'm willing to transfer this repo to anyone interested in its maintenance. Would you? |
If there aren't any other takers, I would be happy to maintain it, since the organisation that I work for, ForgeRock, also has interest in this package not having security vulnerabilities. Alternatively, having multiple maintainers may be a good idea, for a higher chance of changes like this being made. |
@jbgutierrez i will be happy to take it on, since |
I have an extensive history with regexes from my Perl days. Even though node doesn't support |
#10 https://github.com/jeffrey-pinyan-ithreat/path-parse fixes the problem without breaking any tests. |
The regexes could stand a bit more tweaking to make them a little simpler.
|
@jbgutierrez @ljharb Is there any update on fixing this vulnerability? There is already a PR open to fix this and there doesn't seem to be anyone disagreeing with the fix, so can we merge the PR and deploy v1.0.7 to get this security issue removed? The resolve library is using this dependency, and the Angular CLI has started using resolve as a dependency since v11. Our security team does not want open vulnerabilities in our Angular codebase (regardless of its actual potential for misuse, which is the better approach to security anyways), so we are delaying on Angular v10 to avoid triggering this on our security scans. |
@hareharey as soon as I'm handed the repo/commit bit, and also the npm publish rights, I'd be happy to take care of it. |
Some good news regarding to this issue ? |
Any update on supplying repo/commit and npm publish rights to @ljharb ? |
@n8ores It looks like @jbgutierrez just merged PR #10 to fix the redos issue and he published v1.0.7 to the npm registry so you should be good there. @ljharb would just need to update browserify to point to the new dependency and ideally the Angular dependency issue should be fixed in the next minor version. However, I'm not sure how to update the official snyk.io page for this vulnerability so that it shows the new fix version. Maybe @yetingli could help with that? |
resolve uses ^, as does browserify, so no update should be needed. |
Noting that the NVD still flags this as a vulnerability for all versions. I have asked them how we go about updating this CVE Entry: https://nvd.nist.gov/vuln/detail/CVE-2021-23343
|
If this problem has indeed been fixed, is it possible to update the entry here https://nvd.nist.gov/vuln/detail/CVE-2021-23343 so that it doesn't say "All versions of package path-parse are vulnerable..." ? |
Hi,
I would like to report two Regular Expression Denial of Service (REDoS) vulnerabilities in
path-parse
.It allows cause a denial of service when parsing crafted invalid paths.
You can execute the code below to reproduce the vulnerability.
Feel free to contact me if you have any questions.
Best regards,
Yeting Li
The text was updated successfully, but these errors were encountered: