We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
There is a security vulnerability in "strong-globalize": "^3.1.0" (see Prototype Pollution for more details).
"strong-globalize": "^3.1.0"
To reproduce it set up a project with latest loopback-connector-mongodb (v3.4.3) as dependency and run nspover it:
nsp
$> npm init $> npm i --save loopback-connector-mongodb $> npx nsp -- check
The vulnerability comes from [email protected] > [email protected] > [email protected] > [email protected] . All the related packages with the issue have release a version fixing the vulnerability:
[email protected] > [email protected] > [email protected] > [email protected]
[email protected] is released few days ago, so updating it here would fix the issue.
[email protected]
Not apply for this issue.
Not security vulnerabilities after running nsp or npm audit.
npm audit
node -e 'console.log(process.platform, process.arch, process.versions.node)'
darwin x64 8.11.2
npm ls --prod --depth 0 | grep loopback
├── [email protected] ├── [email protected] ├── [email protected] ├── [email protected] ├── [email protected] ├── [email protected]
The text was updated successfully, but these errors were encountered:
@franher Can you please try this again -- npm i for me installs [email protected] which is not vulnerable. nsp comes clean for me.
npm i
Sorry, something went wrong.
@virkt25 You're right. Now, installing loopback-connector-mongodb v3.4.3 and v3.4.4 the security issue is out.
Thank you for your time.
virkt25
No branches or pull requests
Description/Steps to reproduce
There is a security vulnerability in
"strong-globalize": "^3.1.0"
(see Prototype Pollution for more details).To reproduce it set up a project with latest loopback-connector-mongodb (v3.4.3) as dependency and run
nsp
over it:The vulnerability comes from
[email protected] > [email protected] > [email protected] > [email protected]
. All the related packages with the issue have release a version fixing the vulnerability:[email protected]
is released few days ago, so updating it here would fix the issue.Link to reproduction sandbox
Not apply for this issue.
Expected result
Not security vulnerabilities after running
nsp
ornpm audit
.Additional information
node -e 'console.log(process.platform, process.arch, process.versions.node)'
npm ls --prod --depth 0 | grep loopback
The text was updated successfully, but these errors were encountered: