-
Notifications
You must be signed in to change notification settings - Fork 3.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Server-Side-Request Forgery vulnerability introduced in npm 10.4 [BUG] <title> #7216
Comments
That's a vulnerability in a package npm happens to use, and since the npm cli doesn't have any servers, it can't be vulnerable to SSRF. It's a false positive. |
adding the CVE here so it can show up in search: CVE-2023-42282 --- GHSA-78xj-cgh5-2h22 it may be a false positive for edit: |
You guys could simply not bundle your dependencies and allow consumers to address this. There is a readily available fix via |
You can find more context in indutny/node-ip#136 Here you can find how |
The vulnerability is not affected npm, but npm is part of the node and every official node docker image contains npm. Everyone who uses the official docker image got alert. Currently I have the following options:
I manage the whitelist at docker image level so does not matter which option I will choose it takes time for me. I don't know how large effort need to update I would like to kindly ask you if you have time please update |
You wouldn't need a new release of node, you'd just update npm in your docker image. However yes, you're right, this is a fundamental flaw in the CVE system for any package that has more than one code path, and usually one just does option 1 or 3. |
Do you mean run If yes then the prerequisite is a new If I have to do this extra work I would go with option 2 but it also has blockers :) Google distroless supports only node LTS version, so I can't use the built in test runner of node. I just would like to know what is the plan of the npm team. Because based on it I can do better decision. p.s. |
Yes, that's what i mean. I'm not sure why it would add much size; npm is already contained within node. |
This would affect anyone using semantic-release, specifically @semantic-release/npm. I don't know why but they have a dependency on |
In general, most CVEs in the JS ecosystem are false positives, due to dep graphs having lots of transitive dependencies and CVEs having no fundamental code path branching mechanism. Therefore, it is unreasonable to have any systems that block progress based on the presence of a CVE, without also having an easy "bypass" mechanism to unblock progress. Nobody using npm is affected by this vulnerability - however they may be inconvenienced by subpar audit processes and/or tooling. |
I wasted half an hour trying to see how to fix this when Just want to add my voice to everyone requesting this get fixed on the npm side. |
I just hope new version with a fix will come soon. Good to know the "vulnerability" isnt actually a vulnerability, but seeing the warnings during npm install and have the Dependabot alert opened is quite inconvenient. I guess there is no way to temporary change my package.json to override it somehow, since it is a bundled dependency? |
so, can we please just update socks and move on with it? we have auditors that aren't super understanding of the "false positive" response. |
Then the auditors need to be educated, or you’re going to keep running into this problem. |
I'm sorry, have you worked with auditors? Educating them is rarely an option. You explaining that something is a false positive may result in them reducing a risk of that item in their overall assessment, but that's pretty much it. It's not a syntax warning in some IDE, that you can silence with a comment, unfortunately. And that is assuming, that their question would even reach someone who can educate them. |
Everybody is happy if everything is green instead of have to explain something is "false positive" because ... If someone using npm in more than 1 project then they have to add disclaimer to every false positive case. To do it in the proper way you have to investigate every case is it false positive or not. Few enterprise company run full workstation scan in every hour/day and you have to report why is a vulnerable software on your machine. Education and better tooling cause less noise, but as I wrote in my earlier comment if npm and node releases a new version that will be a great help for the community. |
it's just hard to imagine a lower effort change to make, that would have a wider impact than this... it's literally the |
@brock-rb2t its fine if npm issues a patch, and i hope they do. But, this scenario happens many times a year, and every time, the same thing happens - a bunch of auditors who don’t understand software complain, and then a bunch of engineers who just don’t want to deal with it complain, and a bunch of (usually unpaid volunteer) maintainers get burned out from fielding the complaints, which are often unactionable. What I’d prefer to see happen is everyone using the very expertise that got them hired to push back on the auditors so this massive burden on the OSS ecosystem can be reduced. |
hey man, I can get behind that! I'll start pushing back. Also, I'd be happy to join in the effort supporting the OSS eco |
Is there any update on this issue ? Are there any release planned to align with the latest version of |
Any update on this issue? This is a legitimate issue for our organization. As much as pushing back may make sense, it's not going to change the fact that npm is dependent on a vulnerable dependency that is being tracked via npm audit's global vulnerability database (GHSA-78xj-cgh5-2h22).
|
Seconding this. Could use an update ASAP. |
FWIW, dependabot already has an open PR for this and we've spent more time on discourse than it would take to approve and merge the PR (#7238) |
@pog-charlesinglese sure but nobody who's commented here, myself included, has the ability to do so, so that's not a meaningful comparison :-) |
@pog-charlesinglese this just proves, that even 2 years dead repo is able to act faster than npm/cli team (unless it was them who ressurected it and made the patch directly in the source unlike others who switched to another library) |
Interested in a patch too |
This is possible for all other packages except npm. For, without npm already fully installed how could it install its own dependencies? |
#7242 Updates |
Isn't there any patch release for the change in #7242 ? |
#7184 is the next release. |
Thanks! So for v9 also are we having a patch release or its only for v10 ? |
Any hopes for v8 too? |
I think v9.9.3 was just released with the fix. See #7010 |
Just a reminder that npm version 10 is the only supported npm version. We did a backport on v9 but that is only because we are trying to iron out the backporting process in general. npm 9 and 8 are not supported. We will not be updating npm 8. |
Is there an existing issue for this?
This issue exists in the latest npm version
Current Behavior
Expected Behavior
no SNYK detected security vulnerabilities
Steps To Reproduce
Nothing to reproduce, this is a security vulnerability.
Environment
; copy and paste output from `npm config ls` here
The text was updated successfully, but these errors were encountered: