Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump request@2.83.0 #2103

Closed
wants to merge 1 commit into from
Closed

Bump request@2.83.0 #2103

wants to merge 1 commit into from

Conversation

abigailfoster
Copy link

Updating request due to tough-cookie security fix
More info: request/request#2776

Updating request due to tough-cookie security fix
More info: request/request#2776
@abigailfoster abigailfoster changed the title Bump request@2.83.1 Bump request@2.83.0 Sep 27, 2017
@xzyfer
Copy link
Contributor

xzyfer commented Sep 27, 2017 via email

@abigailfoster
Copy link
Author

Understood. I'll close this out.

@acoard
Copy link

acoard commented Oct 5, 2017

Hey, first off, love node-sass and have used it for years, thanks for all the hard work you all do.

That being said, I'm a little alarmed that using node-sass will now be introducing potential vulnerabilities to my application.

My understanding is that the vulnerability is not that serious with a small attack surface. Node-sass only uses the request package to download binary files during the installation phase and no-where else. As such, the attack vector would require compromising the url destination and injecting malicious data into the cookie causing the regex slowdown. Potentially this could make npm install fail, however, if the the attacker has compromised the server hosting the binaries they could make the install fail regardless, e.g. by returning null.

Can anyone confirm/deny this? If I've made any mistakes please let me know. :)

Nonetheless in order to be compliant we have a strict 0 vulnerabilities policy. Even though this vulnerability seems very minor we still must fix it. The only solution I can think of is forking and breaking node < 4 support. Any comments?

Thanks again,
Adam.

@nschonni
Copy link
Contributor

nschonni commented Oct 5, 2017

The ^ should already be installing the latest anyway, we just can't pin or set the minimum above the last version of the lib that will bread older Node. EX: if you install the package today you will install a non-vulnerable version already.

@acoard
Copy link

acoard commented Oct 6, 2017

Thanks for the response, you're entirely correct.

For the record, it turns out that I'm getting different results if I use yarn or npm install. When I use yarn, it winds up installing the problematic version but it's through another package. I'll leave the details below in case it helps anyone else, but this definitely isn't anything node-sass is doing.

npm install

$npm list tough-cookie
npm info it worked if it ends with ok
npm info using npm@5.3.0
npm info using node@v8.6.0
project@1.1.0 /PROJECTDIR/
└─┬ node-sass@3.13.1
  └─┬ request@2.83.0
    └── tough-cookie@2.3.3

npm info ok

Then in between, I rm -R node_modules/ and all lock files.

yarn

project@1.1.0 /PROJECTDIR/
├─┬ karma@1.4.1
│ └─┬ chokidar@1.7.0
│   └─┬ fsevents@1.1.2
│     └─┬ node-pre-gyp@0.6.36
│       └─┬ request@2.81.0
│         └── tough-cookie@2.3.2 # PROBLEM!
└─┬ node-sass@3.13.1
  └─┬ request@2.83.0
    └── tough-cookie@2.3.3

Anyways, thanks again. I'll be digging deeper and maybe opening an issue for Yarn if I can get a test case.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants