-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Latest version of cli is pulling in insecure packages that have available patches #11543
Comments
Hoping that vercel/vercel#11543 gets resolved eventually
Thanks for staying on top of this @G-Rath |
Thanks, but unfortunately I'm not confident that they'll get addressed anytime soon - we're currently in the process of reviewing moving our Vercel apps to Netlify since they setup a whole internal workflow to stay on top of these updates in response to my equivalent issue about their cli (which is even more impressive given they use a shrink-wrap.json where Vercel just pins their top level dependences). I will continue to update this issue for the foreseeable future though |
This is very important for organizations that have security policies that require packages to be updated with all security patches. |
Fixes GHSA-m4v8-wqvr-p9f7 Closes #11201 Also mentioned #11543
Added new GHSA-9wv6-86v2-598j vulnerability, and marked |
I realise that these are probably low priority for the team as these are probably not issues for the CLI, but it would help teams like ours if these were cleaned up. Dependabot raises these as security issues, and we need to dig in and assess if they really are issues or not. CC @trek to perhaps raise with the team. |
Hello, I've got all of these vulnerabilities showing up in GitHub - including undici, btw - though I'm mainly concerned about path-to-regexp and semver as they are both rated as high risk. Now I appreciate that the vulnerabilities may not be exploitable and therefore the risk level is arguably wrong, but even so, we've still got to convince our external auditors of this, which is going to take time and if we fail to do so then that's our security certification up in smoke. I'm sure many other vercel users will have similar problems. So I would like to respectfully request an update, and reiterate that whilst this may be low priority for some people it is not low priority for everyone. Far from it. |
It's important for us too |
@chrisdenton-ct - I emailed vercel security directly about this a few months ago. Essentially they said they're always keeping track of potential security threats and they're aware of these reports but they don't consider them issues and they're not going to fix it |
Apparently it's not an issue for Vercel if companies can't use Vercel because the nested dependencies are flagged. Strange business decision |
Thanks, that's useful to know, though obviously I find that response from vercel to be disappointing. |
I'll try and dig out the email tomorrow |
I have sent an email to the Vercel security team |
I emailed the security team requesting they fix the issues listed in this specific issue Their reply on 23 Sept 2024: Thank you for contacting the Vercel security team. Our software is patched in alignment with our internal vulnerability management process timelines, which relies heavily on contextualisation of vulnerabilities (not just CVSS rating). We'll patch this vulnerability in due course, but please understand this may not be immediate based on the context of the vulnerability. If you would like to see this patched sooner and to contribute to the open source software ecosystem, the team would welcome any PRs to the repository. Please feel free to reach out if you have any further questions or concerns. My thoughtsAll of the reported vulnerabilities have PRs against them. Some are still failing CI but it does feel a bit spicy to ask for paying customers to fix the product they're paying to use. |
For those who still wanted to resolve this, I was able to patch this by adding the following to my "overrides": {
"@vercel/node": {
"path-to-regexp": "8.2.0"
}
}, Can't promise I'll be able to open a PR 🙃, but definitely appreciate the open-source community! |
Tried following the Contributing Guidelines to open a PR, but it seems like there's quite a bit going on here. I'd imagine it'll take a while just to get past "Make sure all the tests pass before making changes." Some things I've noticed: Theoretically this should be fixable by changing the In addition, there were several failing unit tests as well. 🙃 Might be better for someone internal who's more familiar with the overall app + testing to take a look? |
@joey-ma if you're trying to do a PR patching If you'd like to help out, I would recommend exploring upgrading edit: ok for |
Happy new year everyone! I've updated this to reflect changes - namely:
|
The latest version of the
vercel
cli is pulling in packages with known vulnerabilities that have available patches.Current vulnerabilities:
path-to-regexp
v6.1.0, via@vercel/routing-utils
and@vercel/remix-builder
path-to-regexp
to v6.3.0 #12131, [node][routing-utils] Update path-to-regexp to v6.3.0 (internal) #12734 -> reverted: [remix-builder][node][routing-utils] revert path-to-regexp updates #12746)path-to-regexp
v6.2.1, via@vercel/node
path-to-regexp
to v6.3.0 #12131, [node][routing-utils] Update path-to-regexp to v6.3.0 (internal) #12734 -> reverted: [remix-builder][node][routing-utils] revert path-to-regexp updates #12746)debug
v4.1.1, via@vercel/fun
([cli] Update@vercel/fun
to v1.1.1 #11332, [cli] bump vercel/fun version #12701)semver
v7.3.5, via@vercel/fun
([cli] Update@vercel/fun
to v1.1.1 #11332, [cli] bump vercel/fun version #12701)tar
v4.4.18, via@vercel/fun
(patched in v1.1.5, just waiting for [cli] bump@vercel/fun
to v1.1.5 #13070 to land)undici
v5.28.4, via@vercel/node
esbuild
v0.14.47, via@vercel/node
and@vercel/gatsby-plugin-vercel-builder
While I don't believe any of these are exploitable in the context of this cli, they are a nuisance since non-breaking patches are available and security policies can make these expensive to ignore.
`npm audit` output as of 2025-02-11
Related issues and pull requests:
tar
for security fun#104The text was updated successfully, but these errors were encountered: