Security problem with `node-forge`
See original GitHub issueGitHub Security Advisory reports that node-forge
0.9.0, which is an indirect dependency of webpack-dev-server
3.11.0 has a high severity problem: https://github.com/advisories/GHSA-92xj-mqp7-vmcj
Webpack Dev Server uses that package through a package called selfsigned
, which tracks this problem here: https://github.com/jfromaniello/selfsigned/issues/41
Issue Analytics
- State:
- Created 3 years ago
- Comments:17 (6 by maintainers)
Top Results From Across the Web
node-forge - Snyk Vulnerability Database
version published direct vulnerabilities
1.3.1 29 Mar, 2022 0. C. 0. H. 0. M. 0. L
1.3.0 17 Mar, 2022 0. C. 0. H. 0....
Read more >Security vulnerability on the module node-forge #5204 - GitHub
I'm a developer using this npm package and it affect my app. At least yarn audit fix does not solve the problem for...
Read more >A security vulnerability in Node.js node-forge module affects ...
DESCRIPTION: Node.js node-forge module could allow a remote attacker to execute arbitrary code on the system, caused by a prototype pollution flaw in...
Read more >Insecure Cryptography Vulnerability in the node-forge library ...
node-forge improperly verifies cryptographic signatures. The vulnerability exists through improper verification of DigestInfo in the `rsa.js` file allowing ...
Read more >New Year, New CVE: A Deep Dive Into the 'node-forge' (CVE ...
With over 16 Million weekly downloads, the important and widely-used "node-forge" component on npm implements key security functions, ...
Read more >
Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free
Top Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
an alternative to manually editing yarn.lock file was,
@khhhum webpack-dev-server already allows the updated
selfsigned
andnode-forge
, a webpack-dev-server release isn’t required to use those updated dependencies.But it can be confusing to figure out how to update ‘indirect’ dependencies like this, and the tooling can be surprisingly unhelpful.
If you are using
yarn
, the best way i have found is to open up theyarn.lock
manually, and delete the lines forselfsigned
andnode-forge
, and then runyarn install
. It will insert the (new) latest allowable releases ofselfsigned
andnode-forge
into your yarn.lock, and you have updated your dependencies, no need for a webpack-dev-server release. See this blog post and this yarn issue. I remain surprised yarn doesn’t support a way of upgrading indirect dependencies less manually.If you are using
npm
straight without yarn or other alternatives, I’m not certain the approach, but there should be one that does not require awebpack-dev-server
release. If dependencies had to be re-released every time there was a new release of any of their own dependencies, that would be messy!