-
Notifications
You must be signed in to change notification settings - Fork 117
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2022-30123 : rack (2.2.3) #120
Comments
I think a new release needs to be built in order to make this fix visible on rubygems.org ? |
Can anyone take a look on this issue? It should be just a bump on rack version. |
Ok, Ok, I just merged the dependabot PR (#124) since I even got a mention on the other issue, but please note that the "vulnerability" on rack gem here does not at all affect your applications' security. Gems bundled here via Again, I just merged the PR in order to calm you guys down, and also to show you that the project is not dead, but please learn that you generally need not to care about the content of |
Thank you Matsuda-san! I totally agree and understand, sorry to bother the simplecov team for that. My applications itself have requirements to use latest version of rack. What happens to my company (and possibly for some others) is that there are vulnerabilities checkers (AWS Inspector) that scan containers images, looks into package managers files and eventually find the rack version in the "Gemfile.lock". I will look further on AWS Inspector if is possible to suppress this type of finding without suppressing real dependencies vulnerabilities. |
@william-kurosawa Oh, thank you for the explanation! Now I understand the triggers and people's motivation for issues like this. Sounds fair enough actually! |
I have the same problem. Could it be possible to bump this gem to If you don't have time to do that, how can I effectively fork |
@blombard , just to inform you, I am also waiting for another release, but that might be out of Matsuda's hands as it needs to be published to Rubygems. gem 'simplecov-html', git: 'https://github.com/simplecov-ruby/simplecov-html',
ref: 'ea52c023962c449156d9348a827666c981bd3831' I am also trying to reach a AWS Inspector specialist to understand if they don't have a way around this alerts for code that is not even in the image, it's just a lock file inside a dependency with mention to another dependency.. |
@william-kurosawa Perfect, exactly what I needed for now 👌 |
@amatsuda is it possible to get a release of this change? |
Based on the Gemfile.lock I believe that simplecov-html makes use of rack version 2.2.3
That Rack version is has vulnerability CVE-2022-30123 (crafted requests that can cause shell escape sequences).
The solution is to rebuild using rack >= 2.2.3.1
This also fixes CVE-2022-30122.
The text was updated successfully, but these errors were encountered: