Address dependabot alerts #37
Labels
No Label
bug
dependencies
documentation
duplicate
enhancement
good first issue
help wanted
invalid
question
wontfix
Copied from Github
Kind/Breaking
Kind/Bug
Kind/Documentation
Kind/Enhancement
Kind/Feature
Kind/Security
Kind/Testing
Priority
Critical
Priority
High
Priority
Low
Priority
Medium
Reviewed
Confirmed
Reviewed
Duplicate
Reviewed
Invalid
Reviewed
Won't Fix
Status
Abandoned
Status
Blocked
Status
Need More Info
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: cerc-io/laconic-console#37
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Current alerts:
This is something about DoSing the browser process through specifying bad color space data. Doubtful that we are vulnerable since we do not allow color space data to be supplied externally. There is an update fix but dependabot doesn't know how to make the update due to transitive dependency issues. So a developer would need to figure that out. We may also no longer use the code path upon which this dependency arises.
This is about our use of the
request
http client library. The vulnerability is that if we use that library to perform an http get from some server controlled by an attacker, they can cause the library to transparently make a new http get request against some host likelocalhost
, which might be a vulnerable server owned by us. Whether this is actually exploitable is not clear to me: I'm not sure if we make http requests to URLs supplied from outside. There is not currently a simple update fix. There's an unmerged fix, and used in as a patch in Metamask here.This appears to be a bogus CVE in that the complaint is that JSDom (library that allows emulation of a browser's DOM processing in a Node.js process) will load the DOM data from a file on the local filesystem if you ask it to do that. This seems like a nothing burger because the code doing the asking could just as well go ahead and open the file, since Node.js allows that. JSDom maintainers closed the issue, disputing the validity of the CVE and citing documentation as adequate. Dependabot believes the problem is fixed in a newer version of JSDom, but again fails to provide an easy update fix. There is a comment on the issue suggesting that this conclusion by Dependabot is a false negative -- the problem was never addressed, although perhaps JSDom's interface was extended such that if the application wanted to filter resource load requests, it could filter out any local file loads. Since application code would need to be modified to enable this, simply updating the version wouldn't fix any vulnerability but it would shut up Dependabot.