-
Notifications
You must be signed in to change notification settings - Fork 298
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
6 vulnerabilities #153
Comments
These vulnerabilities are in the dependencies, not in Nuts itself. Updating to the most recent versions of the dependencies should fix most, if not all of these. However, even without updating, I doubt any of these are real concerns, considering that the vulnerable libraries are dependencies of dependencies. |
How is a vulnerability in a dependency of a dependency not a real concern? You're still running the code in your app, regardless of how exactly it got there. Granted, it might not be easy for people to do anything about it by changing code in the Nuts repo - you'd have to remove the dependency that depends on a something with a vulnerability. It still seems like a concern though. |
Take a closer look at the vulnerabilities: Prototype Override Protection Bypass - in Regular Expression Denial of Service (DoS) - in Remote memory exposure - in Timing attack - in Uninitialized memory exposure - in Denial of Service - in So yes, there are vulnerabilities, but either they are not exploitable, or are very difficult to exploit. And the end result is that the user either DoS'es themselves, or exposes their own memory to themselves. Either way, this project is dead, and if someone really cares that much about fixing the vulnerabilities, they can simply fork the repo and update the dependencies. |
That makes sense. It's not a big deal because the vulnerabilities themselves are not very severe in practice. It sounded like you were saying they're not a problem because they're in dependencies of dependencies. I see you were actually saying they're simply not really problematic vulnerabilities. Thanks for the more detailed explanation and summaries of the vulnerabilities! |
Vulnerabilities with a fix
An upgrade or patch is available to fix the vulnerable dependencies.
Prototype Override Protection Bypass in qs
Timing Attack in http-signature
Regular Expression Denial of Service (DoS) in ms
Regular Expression Denial of Service (ReDoS) in ms
Remote Memory Exposure in request
Uninitialized Memory Exposure in tunnel-agent
The text was updated successfully, but these errors were encountered: