-
Notifications
You must be signed in to change notification settings - Fork 30.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
upgrade downstream dependencies to fix decode-uri-component CVE-2022-38900 GHSA-w573-4hg7-7wgq #46026
Comments
Thanks for the report but no action is required on our part. The arrangement is that npm submits updates to us. |
@bnoordhuis Hi Ben, It would seem to me that Node picked up the responsibility when Node decided to distribute with npm: specifically to assure that the code Node distributed does not contain vulnerabilities. As is Node installation is spreading vulnerable code. Since Node is distributing npm, Node needs to chase npm to fix the issues. Alternatively, Node should include a version of npm that does not have the vulnerabilities. |
You're of course entitled to your opinions, just don't expect me or anyone else to agree with them. sindresorhus/query-string#345 (comment) quite accurately summarizes the severity of this issue1 and npm probably (and IMO rightly) dismissed it as such. 1 tl;dr someone thought it was an awesome idea to bulk-file "foo is not a function" bugs as security vulnerabilities. Guess that's one way to build up a CVE count when you're an aspiring security researcher. |
@ry + @Trott - Do you agree with @bnoordhuis that this CVE won't be fixed? We owe a customer a mitigation statement for this CVE so I want to make sure I'm accurately capturing reality. |
The npm upgrade in #45936 contains a newer version of that dep. |
To reiterate the previous comment from @bnoordhuis, |
Version
14.21.2
Platform
Linux 19b7e582104e 5.19.0-26-generic #27-Ubuntu SMP PREEMPT_DYNAMIC Wed Nov 23 20:44:15 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
Subsystem
No response
What steps will reproduce the bug?
Node v14 includes npm v6, which in turn includes query-string <7.1.3 which includes the fixed [email protected] for GHSA-w573-4hg7-7wgq GHSA-w573-4hg7-7wgq
Details
[email protected] node-v14.21.2-linux-x64/lib/node_modules/npm
└─┬ [email protected]
└── [email protected]
PoC
See base vulnerability GHSA-w573-4hg7-7wgq GHSA-w573-4hg7-7wgq
Impact
https://nvd.nist.gov/vuln/detail/CVE-2022-38900
GHSA-w573-4hg7-7wgq
How often does it reproduce? Is there a required condition?
No response
What is the expected behavior?
No response
What do you see instead?
https://nvd.nist.gov/vuln/detail/CVE-2022-38900
GHSA-w573-4hg7-7wgq
Additional information
https://github.com/npm/cli/security/advisories/GHSA-5698-6q73-gp8h
Asked npm to fix v6: npm/cli#6010
The text was updated successfully, but these errors were encountered: