Security vulnerabilities
See original GitHub issueAfter running an audit on dependent packages I found out that both jest
and jest-cli
were vulnerable to a prototype pollution (due to lodash
which doesn’t seem to be at the latest version, i.e v4.17.10
), explained here: https://nodesecurity.io/advisories/577.
And a cryptographically weak PRNG (due to randomatic
) which is explained here: https://nodesecurity.io/advisories/157
Issue Analytics
- State:
- Created 5 years ago
- Reactions:2
- Comments:9
Top Results From Across the Web
Vulnerabilities, Exploits, and Threats at a Glance - Rapid7
A Security Vulnerability is a weakness, flaw, or error found within a security system that has the potential to be leveraged by a...
Read more >What is a Security Vulnerability? | Types & Remediation - Snyk
A security vulnerability is a software code flaw or a system misconfiguration such as Log4Shell through which attackers can directly gain unauthorized ...
Read more >10 Common Web Security Vulnerabilities - Toptal
10 Common Web Security Vulnerabilities · Authentication and Authorization: A Cyber Security Primer · Injection Flaws · Broken Authentication · Cross-Site Scripting ...
Read more >Known Exploited Vulnerabilities Catalog | CISA
Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software ...
Read more >Vulnerability (computing) - Wikipedia
Vulnerabilities are flaws in a computer system that weaken the overall security of the device/system. Vulnerabilities can be weaknesses in either the ...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
Hi there @Berkmann18, you’ve been busy creating these issues everywhere. I created responses on other issues you created, but for the edification of anyone who happens to stop by here, the following is a copy of my response on https://github.com/stylelint/stylelint/pull/2888#issuecomment-408215162:
It’s also worth mentioning that it’s never, ever a good idea to create issues about potential security issues or vulnerabilities, given that anyone in the public can exploit the information before a maintainer is able to act and/or the downstream consumers of the package in question are able to act.
I agree, I looked into it for a bit, but admittedly I wasn’t as tenacious as I could have been.
No need to apologize, I think you were doing what seemed right and being on the safe side. If I sounded harsh then allow me to apologize to you instead. It wasn’t intended.
I’m going to go out on a limb and say something that I’ve kept to myself until now. IMHO, the messages are complete nonsense, and I have a hunch that its net impact is costing the ecosystem more in “damages” - in terms of the total time the ecosystem spends on discussing these “vulnerabilities”, replacing packages, dealing with issues, etc. - than from the “vulnerabilities” themselves, their risk, or the actual damages caused by them. If a vulnerability is truly severe enough to be threatening to NPM’s users, it would be dealt with swiftly in a centralized way. It would be strange for a software company to disclose details publicly about an ongoing vulnerability that could still be exploited.
My theory is that NPM is using those messages as a way of creating a competitive advantage over Yarn. The gravity of both the urgency and importance of the warnings is likely to be also associated with NPM, creating cognitive dissonance in users, and potentially more trust in NPM, etc.
I guess this is a conversation for another time and place lol.