-
Notifications
You must be signed in to change notification settings - Fork 394
glob-parent, got, and node-fetch security vulnerabilities for [email protected] #4921
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Thanks for reporting. |
@danez - any update on when we might be able to get this resolved? |
@danez @AndyTurnerNetlify any update? Thanks. |
I think we cannot solve this right now, because there are some dependencies that we cannot yet update because of either ESM compatibility or node version restrictions. |
OK thanks for the explanation. |
With the current version ( Preparation: npm init --yes
npm install --save-dev netlify-cli
Audit npm audit
# npm audit report
decode-uri-component <0.2.1
decode-uri-component vulnerable to Denial of Service (DoS) - https://github.com/advisories/GHSA-w573-4hg7-7wgq
fix available via `npm audit fix`
node_modules/netlify-cli/node_modules/decode-uri-component
glob-parent <5.1.2
Severity: high
glob-parent before 5.1.2 vulnerable to Regular Expression Denial of Service in enclosure regex - https://github.com/advisories/GHSA-ww39-953v-wcq6
fix available via `npm audit fix --force`
Will install [email protected], which is a breaking change
node_modules/netlify-cli/node_modules/@netlify/cache-utils/node_modules/glob-parent
node_modules/netlify-cli/node_modules/@netlify/functions-utils/node_modules/glob-parent
fast-glob <=2.2.7
Depends on vulnerable versions of glob-parent
node_modules/netlify-cli/node_modules/@netlify/cache-utils/node_modules/cpy/node_modules/fast-glob
node_modules/netlify-cli/node_modules/@netlify/functions-utils/node_modules/fast-glob
globby 8.0.0 - 9.2.0
Depends on vulnerable versions of fast-glob
node_modules/netlify-cli/node_modules/@netlify/cache-utils/node_modules/cpy/node_modules/globby
node_modules/netlify-cli/node_modules/@netlify/functions-utils/node_modules/globby
cpy 7.0.0 - 8.1.2
Depends on vulnerable versions of globby
node_modules/netlify-cli/node_modules/@netlify/cache-utils/node_modules/cpy
node_modules/netlify-cli/node_modules/@netlify/functions-utils/node_modules/cpy
@netlify/cache-utils *
Depends on vulnerable versions of cpy
node_modules/netlify-cli/node_modules/@netlify/cache-utils
@netlify/build >=0.1.31
Depends on vulnerable versions of @netlify/cache-utils
Depends on vulnerable versions of @netlify/functions-utils
node_modules/netlify-cli/node_modules/@netlify/build
netlify-cli >=2.13.0
Depends on vulnerable versions of @netlify/build
Depends on vulnerable versions of gh-release-fetch
node_modules/netlify-cli
@netlify/functions-utils *
Depends on vulnerable versions of cpy
node_modules/netlify-cli/node_modules/@netlify/functions-utils
got <=11.8.3
Severity: high
Got allows a redirect to a UNIX socket - https://github.com/advisories/GHSA-pfrx-2q88-qq97
Depends on vulnerable versions of cacheable-request
fix available via `npm audit fix --force`
Will install [email protected], which is a breaking change
node_modules/netlify-cli/node_modules/download/node_modules/got
download >=4.0.0
Depends on vulnerable versions of got
node_modules/netlify-cli/node_modules/download
gh-release-fetch *
Depends on vulnerable versions of download
node_modules/netlify-cli/node_modules/gh-release-fetch
http-cache-semantics <4.1.1
Severity: high
http-cache-semantics vulnerable to Regular Expression Denial of Service - https://github.com/advisories/GHSA-rc47-6667-2j5j
fix available via `npm audit fix --force`
Will install [email protected], which is a breaking change
node_modules/netlify-cli/node_modules/download/node_modules/http-cache-semantics
cacheable-request 0.1.0 - 2.1.4
Depends on vulnerable versions of http-cache-semantics
node_modules/netlify-cli/node_modules/download/node_modules/cacheable-request
14 vulnerabilities (1 low, 2 moderate, 11 high)
To address issues that do not require attention, run:
npm audit fix
To address all issues (including breaking changes), run:
npm audit fix --force
|
In addition to security vulnerabilities there are also 5 deprecation notices in
|
All packages are now at secure versions and The deprecated packages are something that we will also address at some point and I opened a new issue for that: #5724 |
Describe the bug
npm flags security vulnerabilities for the packages glob-parent, got, and node-fetch after having installed the latest [email protected]
Steps to reproduce
Configuration
No response
Environment
System:
OS: Windows 10 10.0.19044
CPU: (16) x64 AMD Ryzen 7 1700X Eight-Core Processor
Memory: 40.85 GB / 63.93 GB
Binaries:
Node: 16.14.0 - C:\Program Files\nodejs\node.EXE
npm: 8.15.1 - C:\Program Files\nodejs\npm.CMD
npmPackages:
netlify-cli: ^10.15.0 => 10.15.0
The text was updated successfully, but these errors were encountered: