-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Webpacker dependency vulnerabilities #2969
Comments
Since webpacker 6 is still in pre-release, and I'm not sure what the upgrade process is -- I would suggest this would best be fixed in a webpacker 5 release (a 5.2.2?) as well as main/6 (if it's not fixed there already). Dependabot is sending warnings to projects, that they have no way to fix compatible with webpacker at present. |
Hi guys, |
Also curious on a v5 fix here |
To add to the list, the |
Would also be great to have a minor version bump for |
@anark, Please, let me know. |
It seems like https://github.com/NMFR/optimize-css-assets-webpack-plugin has not released an update since the 29th of June in 2019, the current version used by webpacker 5.x. The dependency is removed when upgrading to webpack 5.x. |
Would be nice to get a minor version/patch for 4.x is possible. |
After updating to 5.3.0, I no longer see the |
I believe I had to run
The warning went away, at least. But I do still have
plus a new:
|
Even after specifying the new |
We have a couple of dependabot vulnerabilities listed, so I updated the rails-webpacker package which led to is-svg being eliminated as a dependency. I'm still waiting on the ssri fix rails/webpacker#2969 and perhaps that will not come until the rails-webpacker gem get a 6.0 release, which should be sometime soon.
We have a couple of dependabot vulnerabilities listed, so I updated the rails-webpacker package which led to is-svg being eliminated as a dependency. I'm still waiting on the ssri fix rails/webpacker#2969 and perhaps that will not come until the rails-webpacker gem get a 6.0 release, which should be sometime soon.
The
yarn why ssri
# => Found "webpack#[email protected]" |
Another vulnerability for 5.x surfaced:
which is prevented by |
Maybe this is just endemic in Javascript projects, and other people using JS just tolerate always having vulnerabilities? I'm not sure. I'm finding it a little bit distressing to get no communication from webpacker maintainers on this, on what they have as goals or intentions or plans around un-upgradeable vulnerabilities in dependencies. It makes me wonder about the maintenance situation of webpacker. |
Hi All, Sorry for not posting any update here but Webpacker (Webpack) is just a JS build tool so none of it's dependencies actually makes to production app code (it's just produces an optimised bundle of your app code) so as long as your app dependencies don't have vulnerabilities in them you can safely ignore, at least for time being. For example: if an app is built on |
For reference / follow-up see #3017 |
Most of the errors we see coming from yarn audit are for dev dependencies which have no impact in production. See: rails/webpacker#2969 (comment) and rails/webpacker#3017 (comment) We need to be able to suppress warnings which do not apply.
* Fix Totp tests * Replace yarn audit with configurable one Most of the errors we see coming from yarn audit are for dev dependencies which have no impact in production. See: rails/webpacker#2969 (comment) and rails/webpacker#3017 (comment) We need to be able to suppress warnings which do not apply. * Audit lower but allowlist more * Gem updates * Sorbet updates for CI to pass * Standard rb fix * Update arm check
Hello,
Webpacker's dependecies have multiple serious vulnerabilities open. This can be resolved by updating the webpacker 5 version to use the latest version's of at least these dependencies. The following dependencies have vulnerabilities open in them:
y18n
The npm package y18n before versions 3.2.2, 4.0.1, and 5.0.5 is vulnerable to Prototype Pollution.
ssri
ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.
is-svg
The is-svg package 2.1.0 through 4.2.1 for Node.js uses a regular expression that is vulnerable to Regular Expression Denial of Service (ReDoS). If an attacker provides a malicious string, is-svg will get stuck processing the input for a very long time.
This needs to be addressed asap, as projects which use webpacker are now vulnerable to multiple vulnerabilites ranging from Denial of service to prototype pollution.
The text was updated successfully, but these errors were encountered: