-
-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix-vuln: patch cross-spawn to fix ReDoS vulnerability #60
base: main
Are you sure you want to change the base?
fix-vuln: patch cross-spawn to fix ReDoS vulnerability #60
Conversation
Please let me know if there's anything I can do to help get this merged |
+1 |
1 similar comment
+1 |
Any news? |
From the commit history, it seems like only @isaacs is authoring and committing in this project these past few years. He's also involved in other major projects (like glob and npm), so my assumption is that he's busy and will get to this when possible. |
I have just nudged cross-spawn up to the new patch ( Running
|
+1 |
2 similar comments
+1 |
+1 |
bump |
Can you validate and merge that fix please ? |
+1 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Severity : High 7.5 / 10
EPSS score: 0.045% (17th percentile)
Weaknesses : https://github.com/advisories?query=cwe%3A1333
CVE ID : CVE-2024-21538
GHSA ID : GHSA-3xgq-45jj-v275
Versions of the package cross-spawn before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It's OK 👍
Thanks for all the approvals. What kind of timeline are we looking at, for a merge? |
We hope that it will be merged soon, thanks to @pablokurskii ! |
None of the 4 reviewers who have approved this MR so far, have write-access in this repo |
To be clear, this PR is entirely unnecessary because it's using |
hi @ljharb, I know that it's using |
Updating this package won't cause npm to be updated, though, because npm bundles its deps - meaning, you can ask npm to do the update in its next version without any changes in this package. It's not that it hurts to make this change - it's that literally anyone who thinks this PR will help them is misinformed, and is already empowered to help themselves (except if you depend on npm, but npm shouldn't be available in production anyways) |
Hi! Thanks for putting open-source code out there. I appreciate you.
Context
I analyzed one of my projects on Snyk and noticed a high vulnerability from somewhere down my dependency chain.
@tsoa/[email protected] › [email protected] › [email protected] › [email protected]
It turns out cross-spawn < 7.0.5 is the problem. The fix is as simple as to update to that patch number or above. (Source: https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230)
What this PR accomplishes
This PR updates the cross-spawn dependency to its lates patch version number: 7.0.5, published two days ago.
Approach and tests
I've simply ran
npm audit fix
on the project, thennpm test
. Here's the output I saw: