Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Shrinkwrap is forcing insecure dependencies #6731

Open
isaacs opened this issue Jun 24, 2024 · 4 comments
Open

Shrinkwrap is forcing insecure dependencies #6731

isaacs opened this issue Jun 24, 2024 · 4 comments
Labels
type: bug code to address defects in shipped code type: security code to address security issues

Comments

@isaacs
Copy link

isaacs commented Jun 24, 2024

Describe the bug

Because this module ships with a shrinkwrap, it is impossible to avoid using the insecure [email protected], even using overrides.

Please either keep all dependencies up to date with security advisories, or remove the shrinkwrap from the deployment so that we can get security updates.

Steps to reproduce

  • npm install netlify-cli
  • npm audit

Observe that [email protected] is present in the tree, and cannot be overridden, due to the npm-shrinkwrap.json

Configuration

Not relevant.

Environment

System:
OS: macOS 14.5
CPU: (16) arm64 Apple M3 Max
Memory: 14.46 GB / 128.00 GB
Shell: 5.2.0 - /usr/local/bin/bash
Binaries:
Node: 20.13.1 - /usr/local/bin/node
Yarn: 1.22.18 - /usr/local/bin/yarn
npm: 10.7.0 - /usr/local/bin/npm
pnpm: 9.2.0 - /usr/local/bin/pnpm
bun: 1.1.6 - ~/bin/bun
npmPackages:
netlify-cli: ^17.29.0 => 17.29.0

@isaacs isaacs added the type: bug code to address defects in shipped code label Jun 24, 2024
isaacs added a commit to tapjs/tapjs that referenced this issue Jun 25, 2024
Temporarily remove all npm-shrinkwrap.json files, and re-run `npm
install`. (It's fast the second time, because it doesn't have to do
much.)

Re: netlify/cli#6731
@serhalp serhalp added the type: security code to address security issues label Jul 11, 2024
@merlyn-at-netlify
Copy link

Thanks, @isaacs. For context the impact is not very severe given the context that Netlify CLI runs in:

Affected versions of this package are vulnerable to Uncontrolled resource consumption due improper limitation of the number of characters it can handle, through the parse function. An attacker can cause the application to allocate excessive memory and potentially crash by sending imbalanced braces as input.

From: https://security.snyk.io/package/npm/braces/3.0.2

@isaacs
Copy link
Author

isaacs commented Jul 11, 2024

Yeah, it's more annoying than actually hazardous, for sure. But such is life in a world that incentivizes getting your name on a CVE more than it does the subtle nuance of actual security.

@G-Rath
Copy link

G-Rath commented Jul 26, 2024

Related:

I'd really love to see the shrinkwrapping go, as it makes our live a lot harder and would let me make a very solid case for moving us off Vercel as they pin their direct dependencies while also remaining very behind the ball

@G-Rath
Copy link

G-Rath commented Sep 3, 2024

there's now a new micromatch vulnerability that we cannot update due to the shrinkwrap: GHSA-952p-6rrq-rcjv

cc @sarahetter

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
type: bug code to address defects in shipped code type: security code to address security issues
Projects
None yet
Development

No branches or pull requests

4 participants