You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As part of Google's OAuth verification process, I had to self-scan my application for CASA Tier 2. It appeared that one of @google/clasp dependencies has a known vulnerability.
Here's an exceprt of my CASA scan:
CWE
stream
title
description
937
skims
393. Use of software with known vulnerabilities in development
Use of cacheable-request at version 7.0.2 with ['GHSA-8x6c-cv3v-vp6g'] in OWASP/codebase/addon-gsheets/addon/yarn.lock
If I take only a subset of my yarn.lock, the dependencies chain at fault is as follow:
And indeed, all version of cacheable-request before `10.2.7' are impacted by a vulnerability (GHSA-8x6c-cv3v-vp6g).
To be honest, I don't think this vulnerability could be exploited in clasp, but not fixing this would make all add-ons that rely on @google/clasp not compliant with Google's OAuth verification process.
Actual Behavior
I believe updating is-reachable to the latest version (5.2.1) will fix the issue.
Steps to Reproduce the Problem
Install latest version of @google/clasp
Look at your package-lock.json or yarn.lock
The dependency cacheable-request is at version 7.0.2
Specifications
Node version (node -v): v16.17.1
Version (clasp -v): 2.4.2
OS (Mac/Linux/Windows): Mac
The text was updated successfully, but these errors were encountered:
I'm happy to create a PR, but feels like running npm run audit by an official maintainer would speed up the process here:
$ npm audit fix
added 4 packages, removed 64 packages, changed 24 packages, and audited 617 packages in 9s
122 packages are looking for funding
run `npm fund`for details
# npm audit report
request *
Severity: moderate
Server-Side Request Forgery in Request - https://github.com/advisories/GHSA-p8p7-x288-28g6
No fix available
node_modules/request
coveralls *
Depends on vulnerable versions of request
node_modules/coveralls
2 moderate severity vulnerabilities
Some issues need review, and may require choosing
a different dependency.
and among other thing is-reachable would be updated:
Expected Behavior
As part of Google's OAuth verification process, I had to self-scan my application for CASA Tier 2. It appeared that one of
@google/clasp
dependencies has a known vulnerability.Here's an exceprt of my CASA scan:
If I take only a subset of my
yarn.lock
, the dependencies chain at fault is as follow:or more visually:
And indeed, all version of
cacheable-request
before `10.2.7' are impacted by a vulnerability (GHSA-8x6c-cv3v-vp6g).To be honest, I don't think this vulnerability could be exploited in clasp, but not fixing this would make all add-ons that rely on
@google/clasp
not compliant with Google's OAuth verification process.Actual Behavior
I believe updating
is-reachable
to the latest version (5.2.1
) will fix the issue.Steps to Reproduce the Problem
cacheable-request
is at version7.0.2
Specifications
node -v
): v16.17.1clasp -v
): 2.4.2The text was updated successfully, but these errors were encountered: