Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Regex DoS (ReDos) Vulnerability [FIXED] #156

Closed
drewjenkins opened this issue May 23, 2018 · 14 comments
Closed

Regex DoS (ReDos) Vulnerability [FIXED] #156

drewjenkins opened this issue May 23, 2018 · 14 comments
Labels

Comments

@drewjenkins
Copy link

From Snyk

✗ High severity vulnerability found on [email protected]

@drewjenkins
Copy link
Author

This still affects version 3.0.0 as well

@phpfs
Copy link

phpfs commented Jun 14, 2018

Any updates to this?

@rmg
Copy link
Member

rmg commented Jun 28, 2018

I'm about to work on a fix for this, but in the mean time I'd like to list some of the mitigating factors involved so users can decide if they are affected by this or not.

This only affects the --forward feature, which is a development-time convenience feature for running a local http proxy that you can configure your browser to use.

If you're running this proxy in a publicly accessible manner then this vulnerability is probably the least of your concerns.

rmg added a commit that referenced this issue Jun 28, 2018
In addition to being faster by not re-parsing the string, this also
addresses #156

Signed-off-by: Ryan Graham <[email protected]>
@rmg
Copy link
Member

rmg commented Jun 28, 2018

v3.0.1 has been published with a fix.

@rmg
Copy link
Member

rmg commented Jun 28, 2018

I'm at a loss as to how to update the vulnerability DBs 😞

It would also be nice to update the update the severity since "high" seems a little misleading considering you need to do something already considered dangerous (run a dev tool as a public open proxy) in order to even expose this.

@rmg rmg added the security label Jun 30, 2018
@Glutnix
Copy link

Glutnix commented Jul 6, 2018

Do you just email [email protected] or [email protected] ?

@rmg
Copy link
Member

rmg commented Jul 6, 2018

Snyk and HackerOne are not affiliated with npm/nsp so I'm not sure what they would be able to do about it.

@rmg rmg changed the title Regex DoS (ReDos) Vulnerability Regex DoS (ReDos) Vulnerability [FIXED] Jul 6, 2018
@fmagaldea
Copy link

This stills affects version 3.0.1 as well, here is "npm audit" report extract:
foreman_3 0 1_npm-audit

@rmg
Copy link
Member

rmg commented Oct 11, 2018

@fmagaldea that advisory is incorrect.

@sonicoder86
Copy link

@rmg How can we fix the npm audit error?

@AmirBraham
Copy link

Any updates to this ? I get the vulnerability is fixed but it's still showing the advisory

@rmg
Copy link
Member

rmg commented Jan 7, 2019

I've sent an email to [email protected] to ask them to update the record.

@Pilatch
Copy link

Pilatch commented Dec 16, 2019

When you do get that record updated, would you bump the version to 3.0.2 to make sure our random internal processes see it as a new artifact?

@msakrejda
Copy link

I just installed node-foreman and ran npm audit and I got no open advisories. It looks like https://www.npmjs.com/advisories/645 now notes "Upgrade to 3.0.1" is the fix @rmg so maybe this can just be closed?

@rmg rmg closed this as completed Jun 20, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

9 participants